FM 34-3
INTELLIGENCE ANALYSIS
MARCH 1990
HEADQUARTERS, DEPARTMENT OF THE ARMY
DISTRIBUTION RESTRICTION: Approved for public release: distribution is unlimited
FIELD MANUAL
NO 34-3
Preface
CHAPTER 1 -
CHAPTER 2 -
CHAPTER 3 -
CHAPTER 4 -
Distributio
*FM 34-3
HEADQUARTERS
DEPARTMENT OF THE ARMY
Washington, DC, 15 March 1990
INTELLIGENCE ANALYSIS
1
Table of Contents
The Intelligence Mission
The AirLand Battle
The Battlefield Area
The Intelligence Analysis System
The Intelligence Cycle
Directing
Collecting
Processing
Dissemination
Order of Battle
Order of Battle Factors
Order of Battle References
Order of Battle Records
Enemy Combat Effectiveness
Arbitrary Unit Designators
Intelligence Preparation of the Battlefield
Purpose of Intelligence Preparation of the
Battlefield
Development and Use of Intelligence
Preparation of the Battlefield Products
Weather Analysis
Threat Evaluation
Threat Integration
Intelligence Preparation of the Battlefield
During Peacetime
Page
iv
1-1
1-1
1- 4
1-6
2 - 1
2-1
2-2
2- 3
2-18
3- 1
3-1
3-6
3-11
3-28
3- 28
4- 1
4-3
4-5
4-21
4-24
4-26
4-34
n restriction: Approved for public release;
distribution is unlimited.
This publication supersedes FM 34-3, 13 January 1986.
Page
CHAPTER 5 - Analysis in Depth 5-1
Meeting User Requirements 5-1
Determining the Risk Factor 5-3
The Threat Model 5-5
Biases 5-11
CHAPTER 6 - Situation Development 6-1
Enemy Capabilities 6-1
Enemy Courses of Action 6-3
Working Situation Map 6-4
Factors of Analysis 6-7
Techniques of Analysis 6-9
CHAPTER 7 - Target Development 7-1
Decide 7-4
Detect 7-8
Del iver 7-12
CHAPTER 8 - Intelligence Support of Electronic 8-1
Warfare Operations
Intelligence Collection to Support 8-1
Electronic Warfare
The Effects of Terrain and Weather on 8-2
Electronic Warfare
Intelligence Required for Electronic 8-2
Warfare Support Measures
Intelligence Required for Electronic 8-2
Countermeasures
Intelligence Required for Electronic Counter- 8-3
Countermeasures
CHAPTER 9 - Counterintelligence Analysis 9-1
Counter Human Intelligence Collection 9-2
Counter Signals Intelligence Collection 9-3
Counter Imagery Intelligence Collection 9-3
Other Intelligence Support to Cl Analysis 9-3
Multidiscipline Counterintelligence 9-13
Intelligence Support to Combatting Terrorism 9-13
CHAPTER 10 Intelligence Support to Counterinsurgency 1o ' 1
Support of Counterinsurgency Operations 10-2
Intelligence Estimate 10-2
Processing Information 10-3
Dissemination 10-12
Order of Battle 10-12
Page
APPENDIX A - Report Formats A-1
APPENDIX B - Automation Support to Intelligence Analysis B-1
APPENDIX c - Indicators of Enemy Courses of Action c-1
APPENDIX D - Enemy Strength Computations D-1
APPEND IX E - Terrain Analysis in Intelligence Preparation E-1
of the Battlefield
GLOSSARY
REFERENCES
1 NDEX
Glossary -1
References -1
Index -1
PREFACE
This publication describes the processes, procedures, and techniques
used to produce all-source intelligence. It focuses on intelligence
production at echelons at corps and below and amplifies the doctrine
contained in FM 34-1. It provides guidance for intelligence staff
officers, warrant officers. NCOs, and intelligence analysts at all skill
levels. it is designed for use by the active Army and reserve components
(RC).
This publ ication implements international standardization agreement
(STANAG) 2077 and quadripartite agreement 511. it is in compliance with
STANAGS 1059, 2033, 2044, 2149, 6004, and 6010: quadripartite agreements
170, 295, 354, 492, 523, 528, and 593; and air agreement 101/3D. The
proponent of this publication is Headquarters, United States Army Training
and Doctrine Command (HQ TRADOC), Submit changes for improving this
publication on DA Form 2028 (Recommended Changes to Publications and Blank
Forms) and forward it to the Commander, US Army Intelligence Center and
School (USAICS), ATTN: ATSI-TD-PAL, Fort Huachuca, Arizona 85613-7000.
CHAPTER 1
THE INTELLIGENCE MISSION
Intelligence is a key element of combined arms operations. It enables
commanders to use their combat power effectively to win the decisive
battles and it helps them identify and attack high payoff targets (HPTs).
Intelligence is an important part of every combat decision.
The dramatic improvements in intelligence collection systems have
greatly enhanced the availability of battlefield information from many
different sources. Battlefield information, however, is of limited value
until it has been analyzed, Through analysis, this information becomes
intelligence. The intelligence analyst integrates the seemingly
insignificant bits of information from multiple sources to produce an
overall picture of the battlefield. This picture reduces the
uncertainties about the battlefield and the situation. Analysis generates
the intelligence the commander needs to successfully fight on the modern
battlefield.
This chapter describes the commander’s intelligence requirements. It
describes how these requirements are generated and the factors that affect
them. It addresses those elements within the intelligence and electronic
warfare (IEW) system that plan, coordinate, and execute intelligence
analysis operations.
THE AIRLAND BATTLE
Intelligence is a vital part of the AirLand Battle. AirLand Battle is
the current US Army doctrine for fighting in a mid- to high-intensity
conflict. It is an extended, integrated battle involving the use of all
available air and land forces. It is extended because the battle is
fought from the forward edge of the area of operation (AO) to the rear
boundary as a single, continuous battle (deep, close, and rear
operations) . It is integrated in that nuclear and chemical weapons, when
released by the national command authority, are merged with electronic and
conventional weapons in all operations.
AirLand Battle Doctrine is offensively oriented. Its success depends
on the ability of friendly forces to take the initiative from the enemy
and to carry the fight into the enemy’s rear. The simultaneous attack of
forward enemy forces and the deep attack of follow-on echelons is inherent
in the battle. Its objectives include the diversion, delay, destruction,
or attrition of enemy fol low-on echelon forces before they can take part
in the close operation. Figure 1-1 shows a sample deep attack.
The commander orchestrates a combination of offensive and defensive
operations to defeat the enemy and gain the initiative. The commander
uses defensive and offensive operations to destroy enemy first-echelon
forces and deep-attack to simultaneously delay, disrupt, and manipulate
enemy follow-on forces. The commander anticipates, creates, and exploits
windows of opportunity, using flexible battle planning, to gain the
initiative through offensive operations. By effectively employing
maneuver and fire support assets, manipulating the enemy, and expertly
1-1
Figure 1-1. Deep attack.
using the weather and the terrain, the friendly commander can successfully
defeat a superior enemy force.
To gain the initiative, the commander must—
® See the enemy early and determine the capabilities and intentions
of the enemy.
0 Find and track enemy follow-on echelons.
0 Identify enemy high-value targets (HVTs), targets which if
successfully attacked, will contribute to the degradation of
important enemy battlefield functions,
0 Identify, locate, and develop the required targeting data for the
attack of HPTs, which if successfully attacked, will contribute to
the success of friendly plans.
0 Detect enemy weaknesses and develop the necessary data to support
the exploitation of these weaknesses.
1-2
"Effectively use electronic warfare (EW) to support the AirLand
Battle while protecting friendly use of the electromagnetic
spectrum.
"Determine the enemy’s capability and guard against that
capability.
"Protect friendly forces and operations from enemy intelligence
collection operations.
"Use the weather and terrain to friendly advantage.
IEW support is vital to the successful planning and execution of the
AirLand Battle at all echelons. Intelligence support at brigade and
battalion levels focuses primarily on the close operation, while at
division it focuses on both close and deep operations. Corps is the focal
point for intelligence operations that support rear and deep operations.
Intelligence support of close operations supports the commander’s risk
analysis and consideration of mission, enemy, terrain, troops available,
and time (METT-T). As such it must be the first step in planning.
Intelligence operations reduce risk by identifying the enemy's most likely
courses of action, and so al low the commander to concentrate or disDerse
forces as appropriate. Intelligence also provides administrative and
logistic personnel, engineers, air defense artillery (ADA) staffs, and
other planners with guidelines about the expected situations and enemy so
they may make the best use of scarce assets.
To conduct deep operations the intelligence system supports the . .
commander’s need to look deep, find and follow enemy follow-on forces, and
detarmine their capabilities, vulnerabilities, and intentions. The
commander must designate the HPTs and decide where and when to attack them
to achieve the greatest benefit to the operation. The commander conducts
deep attacks against designated HPTs to ‘“shape”’ the battlefield by forcing
the enemy commander to deviate from established plans and to create
favorable conditions for friendly commanders conducting close operations.
To facilitate deep operations, corps-level intelligence planning must
focus its attention on analyzing and estimating enemy capabilities,
intentions, and likely courses of action at least 72 hours in advance. At
division-level, intelligence planners must perform this same function at
least 24 hours in advance.
Intelligence support of rear operations supports the commander’s need
to identify enemy capabilities, intentions, and likely courses of action
to interdict friendly combat support (CS) and combat service support (CSS)
functions, and to inhibit the ability of the friendly commander to
flexibly employ the reserves. The intelligence planner must consider all
means and measures available to tha enemy, to include sabotage,
unconventional warfare, airmobile or airborne assaults, nuclear, chemical,
and conventional long-range strikes, deception, and the employment of
maneuver forces in deep exploitation or raiding operations.
1-3
THE BATTLEFIELD AREA
Commanders consider the battlefield in terms of the time and space
necessary to defeat an enemy force or complete an operation before the
enemy can reinforce. They view the battlefield as having two distinct
areas: the AO and the area of interest (Al).
The AO is that portion of an area of conflict necessary for military
operations. The AO is assigned by the next higher commander and
designated by lateral and rear boundaries. It carries with it the
authority and responsibility to conduct operations therein. The commander
must coordinate with adjacent commanders before conducting maneuver and
fire support (FS) activities outside the designated AO.
The Al is that area of concern to the commander which includes the AO
and areas adjacent thereto. It includes areas forward of, and to the
flanks and rear of the AO. It encompasses areas either occupied by enemv
forces that could jeopardize friendly mission accomplishment and/or which
includes the objectives of friendly current or planned operations.
Each commander determines his own Al. The commander generally relies
on higher headquarters and adjacent units to provide information and
intelligence about enemy forces in that area. Figure 1-2 shows the
battlefield areas of division.
Battlefield areas are important to the intelligence analyst because
they help focus the information requirements of commanders concerning the
weather, terrain, and enemy forces from battalion to echelons above corps
(EAC). Specific information requirements are dependent on the mission and
the tactical situation. Usually, in conventional operations, information
requirements (IR) on enemv forces are based on the one-up and two-down
formula. Commanders require detailed information about enemy forces at
their equivalent levels of command as well as at one level above and two
levels below their own. For example, brigade commanders need information
about enemy regiments (equivalent level), enemy divisions (one-up), and
enemy battalions and companies (two-down). Generally, the enemy forces of
concern to each commander are found within the command’s AO and Al.
The IEW mission includes four major tasks: situation development,
target development, EW, and counterintelligence (Cl).
Situation development (discussed in Chapter 6) provides commanders
with the intelligence they need to make sound tactical decisions. It is a
continuing estimate of the situation that projects enemy intentions and
the effects of the weather and terrain. Situation development helps
cormnanders—
0 Find and follow enemv forces.
0 Determine enemy capabilities, vulnerability ies. and intentions.
0 Identify the enemy main effort.
1-4
"Determine how the weather and terrain will affect friendly and
enemy operations.
"Detect opportunities to exploit enemy weaknesses and seize or
retain the initiative.
"Assess the relative value of enemy combat systems, which serves as
a basis for selecting HVTs.
Target development (discussed in Chapter 7) provides combat
information, targeting data, and correlated target information which
support the commander’s tactical plans. It focuses on HPTs which have
been selected, through the targeting efforts of the G2 or S2, the G3 or
S3, and the fire support element (FSE), and approved by the commander.
Target development identifies, locates, and tracks HPTs until thev are
neutralized. Target development operations must provide sufficiently
accurate targeting data to attack by fire, maneuver, or electronic means.
Situation and target development provide the intelli gence required to
fight the AirLand Battle. Both are distinct tasks, but are interrelated
and totally integrated to provide an accurate picture of the battlefield.
1-5
EW (discussed in Chapter 8) exploits, disrupts, and deceives the enemy
command and control (C 2 ) system while protecting friendly use of
communications and non-communications systems. It is a significant force
multiplier when integrated and employed with fire and maneuver. EW
consists of the following functions:
'EW support measures (ESM), which provide commanders the capability
to intercept, identify, and locate enemy emitters.
"Electronic countermeasures (ECM), which provide commanders the
capability to disrupt enemy use of the electromagnetic spectrum.
"Electronic counter-countermeasures (ECCM), which are used to
protect friendly command, control, and communications (C 3 ) systems
against enemy radioelectronic combat (REC) activities.
Cl (discussed in Chapter 9) includes specific actions which support
the protection of the friendly force. Enemy commanders, to succeed
against friendly forces, must employ all-source intelligence systems to
collect information about friendly forces. Depriving enemy commanders of
vital information about friendly forces is crucial to friendly success on
the battlefield. Cl enhances the operations security (OPSEC) of the
command by supporting the following actions:
° Countering the hostile intelligence threat.
° Safeguarding the command from surprise.
"Deceiving the enemy commander.
"Countering enemy sabotage, subversion, and terrorism.
"Developing essential elements of friendly information <(EEFI).
THE INTELLIGENCE ANALYSIS SYSTEM
The intelligence analysis system is a single, integrated system that
extends from battalion level to national agencies. Figure 1-3 shows the
all-source intelligence system.
The system includes the directors, coordinators, producers, and
executors. All are linked together both laterally and vertically to
ensure a coordinated and effective effort. Figure 1-4 shows the common
IEW structure.
Analysis elements are the heart of the intelligence system. They
include--
"Intelligence officers and their staff sections.
"Echelons above corps intelligence centers (EACICs).
1-6
Figure 1-3. All-source Intelligence system.
COORDINATORS
G2 AND S2
INTELLIGENCE
Cl
SECURITY
G3 AND S3
OPERATIONS
EW
OPSEC
DECEPTION
DIRECTOR
FORCE COMMANDER
PRODUCERS
02 SECTIONS
EACIC
TOC SUPPORT ELEMENTS
BlCCs
EXECUTORS
UNIT COMMANDERS
Ml, CAVALRY,
ARTILLERY,
MANEUVER,
ENGINEER,
AVIATION AND
ALL OTHERS.
Figure 1-4. Common IEW structure.
1-7
"Tactical operations center (TOC) support elements at division and
corps levels.
"Technical control and analysis elements (TCAEs) organic to
military intelligence (Ml) combat electronic warfare and
intelligence (CEWI) battalions at division-level and Ml CEWI
brigades at corps-level.
"Battlefield information coordination centers (BICCs) at maneuver
and artillery battalions and brigades.
INTELLIGENCE DIRECTOR, COORDINATORS, AND PRODUCERS
The intelligence director (commander), coordinators (staff), and
producers (such as EACICS, TOC support elements, TCAEs, and BICCs) play
the major roles in intelligence analysis.
Commander
The commander plays a critical role in intelligence analysis. The
commander determines what intelligence is needed to plan and execute an
operation. The commander provides guidance to the staff to ensure that
the analysis effort is integrated with the other functional systems of the
command and that it is focused on critical requirements and priorities.
The commander, with the intelligence and operations staffs, accomplishes
the planning, directing, guiding, and decision making that generate
intelligence analysis and keep it going. The commander approves or
modifies the priority intelligence requirements (PIRs) recommended by the
G2.
Staffs
While the commander approves the PIR for the command, every staff
officer in the command needs intelligence to support the functions under
their staff responsibilities. However, the staff officers that are most
involved with intelligence requirements are the G2 or S2, the G3 or S3,
and the FS coordinator (FSCOORD).
G2 or S2 . The G2 or S2 manages intelligence operations. This officer is
responsible for intelligence production and for determining the enemy’s
intentions. The G2 or S2 recommends PIR, based on the commander’s
guidance and concept of the operation. The officer manages the collection
effort, supervises al i-source analysis, and ensures that combat
information and intelligence are disseminated rapidiy. The G2 or S2
develops the intelligence estimate. The officer ensures a team effort in
planning, supervising, and executing iEW operations within the command.
G3 or S3 . Second only to the commander, the G3 or S3 is the primary user
of intelligence. As the principal planner and coordinator of unit
operations, this officer relies heavily on intelligence support. The
operations officer completes the estimate of the situation and recommends
which friendly courses of action are feasible and which should be
adopted. These estimates are based on the METT-T, of which a major part
1-8
is provided by intelligence. The G3 or S3 IRs are the same as, only more
detailed than, those of the commander. The operations officer plays
a key role, in conjunction with G2 or S2, in developing and recommending
the PIR.
The G3 or S3 also has staff responsibility for EW, OPSEC, and
battlefield deception (BAT-D). This officer relies on intelligence to
plan and coordinate each of these functions.
Fire Support Coordinator . The FSCOORD plans and coordinates FS. Th is
officer needs intelligence for FS targeting and target development. The
FSCOORD, G2 or S2, and G3 or S3 coordinate very closely in selecting HPTs
and developing targeting data for attacking HPTs.
Tactical Operations Center Support Elements
The TOC support elements provide dedicated intelligence support to the
G2 or S2. TOC support elements, which are assigned to the headquarters
and headquarters company (HHC) of the division, or the operations
battalion of the corps Ml brigade, perform intelligence collection
management (CM), analysis, and dissemination functions. The all-source
production section (ASPS) or equivalent element within the TOC support
element performs intelligence analysis. Other TOC support element
sections are collection management and dissemination (CM&D) and Cl
analysis, which support the G2: and the EW and OPSEC staff elements, which
support the G3. There is also an informal targeting team formed in the
DTOCSE and CTOCSE to assist in the targeting effort.
The ASPS works under the staff supervision of the G2 or S2. It
develops and maintains the intelligence data base. It develops
intelligence from unprocessed information and other intelligence
products. It performs IPB, assists the G2 or S2 in developing the
intelligence estimate, and develops the analysis of the battlefield area.
It also develops situation and targeting data to support maneuver, fire,
and other battlefield functions. Each ASPS coordinates with other TOC
support elements to ensure that all available data is evaluated and to
exchange analysis approaches, techniques, and ideas for solving common
intelligence problems.
Technical Control and Analysis Element
The TCAE, in addition to managing the signals intelligence (SIGINT)
collection and EW assets, performs SIGINT analysis for the command. It
maintains the enemy electronic order of battie (EEOB) and technical data
bases. It analyzes and correlates ESM and SIGINT data from all sourcesto
update the EEOB and technical data bases needed to produce SIGINT. It
passes SIGINT data to the ASPS for correlation with information and
intell igence from other sources.
Battlefield Information Coordination Centers
The BICCs are organic to maneuver brigades, battalions, and other
support units. They consist of analysts who operate within their unit
1-9
TOCS as an integral part of the S2 section. They provide an organic
intelligence management, production, and dissemination capability. BI CCs
vary in the size and type of support they provide, For example, maneuver
unit BICCs concentrate on both situation and target development, while
artillery unit BICCs are almost exclusively interested in target
acquisition (1A) and development.
INTERACTION OF ANALYSIS ELEMENTS
Close coordination and interaction between analysis elements make the
system function effectively. Analysis elements at all echelons exchange
requirements, information, and intelligence both laterally and vertically
throughout the system. At the same time they disseminate combat
information and intelligence to maneuver, FS, and other units that need
it.
1 -1 o
CHAPTER 2
THE INTELLIGENCE CYCLE
Intelligence operations follow a four-phase process known
intelligence cycle. The intelligence cycle is oriented to the
mission. Supervising and planning are inherent in all phases
cycle. Figure 2-1 shows the intelligence cycle.
as the
commander’s
of the
Figure 2-1. The intelligence cycle.
The intelligence cycle is continuous. Even though the four phases are
conducted in sequence, all are conducted concurrently. While available
information is processed, additional information is collected, and the
intelligence staff is planning and directing the collection effort to meat
new demands. Previously collected and processed information
(intelligence) is disseminated as soon as it is available or needed.
This chapter describes the procedures outlined above and the
processing phase of the intelligence cycle.
DIRECTING
The intelligence effort begins by determining requirements,
establishing their priorities, and communicating information or
intelligence collection orders (to subordinate elements) and requests (to
2-1
higher and adjacent units). This is accomplished by the commander and the
intelligence and operations staff. Sources of information or intelligence
requirements include the following:
"Commander’s planning guidance, concept of the operation, and
stated requirements.
"METT-T analysis by intelligence and operations staffs.
° Requests for intelligence information (Rlls) from higher,
adjacent, allied, and subordinate units and elements, and from other
staff elements within the command.
The highest or most important IRs are designated as PIRs. The
commander chooses PIRs based in part on the recommendation of the G2 or
S2. PIRs are those intelligence requirements for which a commander has an
anticipated and stated priority in the task of planning and decision
making. However, an excessive number of PIRs degrades efforts to focus
relatively scarce intelligence collection resources on the most essential
intelligence requirements.
IRs are those items of information regarding the enemy and the
environment needing collection and processing to meet the intelligence
requirements of the commander. IRs can either support PIRs or be
stand-alone requirements of a lesser priority than PIRs. Both PIRs and
IRs serve as the basis for collection and intelligence efforts.
Intelligence analysts in the ASPS advise the G2 regarding the PIRs and
IRs. They analyze METT-T factors and the commander’s guidance and concept
of the operation to determine what intelligence and information is
needed. The ASPS reviewa the existing data base to identify information
that is already available and that which must be acquired. They pass
requirements for new information to the CM&D section as additional
collection requirements. Figure 2-2 shows the directing phase from the
commander’s intent to the commander’s requirements.
COLLECTING
Based on requirements, the CM&D section manages the collection effort.
The CM&D section develops a collection plan that is keyed to the PIRs and
IRs. It continuously updates the collection plan as the situation
changes.
The ASPS assists the CM&D section in planning and supervising the
collection effort. The ASPS helps convart intelligence requirements into
specific information requirements (SIR). SIR are keyed to indicators (see
Appendix C) which when integrated with other indicators and factors
present on the battlefield may provide clues to the enemy’s most probable
course of action. The ASPS monitors incoming reports, advises the CM&D
section when PIR or IR are satisfied, identifies naw requirements, and
determines when previously requested information is no longer needed.
2-2
* PIRsrecommended by G2and approved by the commander
Figure 2-2. Commander’s requirements and guidance.
Collection operations generate information from various sources. This
information is fed into the ASPS. The ASPS—
"Reports combat information immediately.
"Processes information to develop the intelligence needed for
tactical decisions and targeting.
PROCESSING
Processing is the phase in the intelligence cycle in which information
becomes intelligence. It consists of three operations:
"Recording. Recording is the reduction of information to writing
or some other form of graphical representation and the arranging of
this information into groups of related items.
2-3
0 Evaluation. Evaluation is the determination of the pertinence of
information to the operation, reliability of the source or agency,
and accuracy of the information.
0 Analysis. Analysis is the determination of the significance of
the information, relative to information and intelligence already
known, and drawing deductions about the probable meaning of the
evaluated information.
Processing is a continuous operation. The analyst processes new
information as it is received without waiting for additional information.
Intelligence derived from fragmentary information is essential,
particularly during fast-moving operations or when the information
concerns an HPT. Normally there is a time lag between the time an enemy
target presents itself and the time the information becomes available to
an element that can react to it. Complete information about a target or a
situation is seldom available. The analyst continuously identifies
information gaps and attempts to acquire information to complete, confirm,
or refute fragmentary information. This information must assist the
corrmander to generate and apply combat power. It helps the commander to
strike critical units or areas, and to achieve and retain the initiative.
Figure 2-3 shows information processing.
* Should only be done with perishable and critical combat Information in which extensive evaluation will Impact on It's timeliness.
Figure 2-3. information processing.
2-4
The sequence for processing varies with the nature and urgency of the
information. Information is normally recorded first: however, if it
contributes to the development of urgent intelligence, it is recorded
simultaneously with or after evaluation and analysis. Combat information
or partially developed intelligence that is needed immediately is
disseminated before it is completely processed. Information that is not
of immediate value is processed before it is disseminated.
Evaluation and analysis may occur simultaneously followed by immediate
dissemination. For example, information from a reliable source may
indicate that the enemy is about to launch a major attack, In this case,
recording is of secondary importance, and the intelligence report that an
attack is imminent is disseminated as soon after receipt as possible.
Reporting of information to higher and lower echelons occurs
concurrently with processing, For example, to speed target execution
time of HPTs, a commander orders lower headquarters to report all
information concerning specified enemy units, areas, or activities before
the processing cycle is complete. Lower headquarters make similar
requests of higher headquarters,
A sound collection program that effectively uses collection assets
results in a heavy volume of information. Some information may be of no
use to the collecting unit, but of great value to adjacent, higher, or
lower units. This includes many reports which may appear insignificant
and unrelated to other information. However, when these reports are
analyzed along with other available information, definitive and
predictable patterns of enemy activity often emerge.
Today, most information is processed manually. Emerging automatic
data processing (ADP) systems help the analyst process greater volumes of
information faster and mors accurately. Appendix B describes ADP support
to intelligence analysis. Developing and maintaining an intelligence data
base is essential to processing. The data base is the basis for analyzing
new information neaded for situation and target development as well as CM,
EW, and Cl operations. When possible, intelligence data bases are created
for contingency areas during peacetime. Initially, data base information
and intelligence are collected by researching available literature
pubt ished by various agencies and sources, including the following:
"Central
° Defense
"National
"US Army
° Unified
Intelligence Agency (CIA).
Intelligence Agency (DIA).
Security Agency (NSA).
Intelligence Agency (USAIA),
and specified commands.
"Theater commands.
2-5
"Allies.
"Open sources.
The analyst identifies gaps in the data base and passes requirements
to the collection manager. As information is received from the various
collection agencies, it is correlated with existing information in the
data base to assess its significance. Combat information, often highly
perishable in nature, is disseminated immediately.
RECORDING
Recording information into the data base makes evaluation and analysis
easier and more accurate and facilitates preparation of intelligence
reports by conveniently drawing together all available information on a
specific subject. The recording means used must be adequate to handle the
volume of information and intelligence received and to serve the needs of
those who must have access to it. Means and techniques of recording must
permit timely dissemination of information and intelligence.
Recording is more complex at higher command echelons. At division
level and above, ADP systems assist in the recording function. Some of
the more common recording devices are listed below. Others are used when
required.
"Intel ligence journal.
"Intel ligence files.
"Situation map (SITMAP).
"Intelligence workbook.
"Coordinate register.
"Order of battle (OB) records.
Intelligence Journal
The journal is an official, permanent, and chronological record of
reports and messages that have been received and transmitted, important
events that have occurred, and actions taken in response. Accuracy and
completeness are essential , since various elements of the headquarters
will refer to it later. It covers a specified time period, usually 24
hours. Journal entries should reflect--
“An accurate and concise statement of the message, report, or
event.
"A notation about the sender or individual making the report, to
include unit duty position and section: for example, S3 1/60
Infantry Battalion.
2-6
°The time of receipt or dispatch and method of transmission.
"Action taken as a result, to include dissemination given to
reports, other information received, and other internal G2 recording
(workbook, SITMAP),
Journal entries are concise and record the time and essential facts.
As a minimum the journal entries include—
"Purpose, subject, and conclusions of conferences.
"Command decisions and summarizations of plans.
"Movements of enemy units, one echelon above and two echelons below
your own level,
"Significant messages (radio, radio teletypewriter (RATT),
hard-copy, overlays, photos, and any other verbal or written
reports) transmitted and received.
"Incidents of enemy activity.
"Friendly patrol activity.
"Liaison activities.
"Changes in personnel within the staff see”t ion.
"Summaries of written messages and orders.
"Summaries of action based on enemy and fr iendly activity.
Figure 2-4 shows a partially completed intelligence journal
(DA Form 1594).
Intelligence Files
Intelligence files permit ready access to all available information.
The files most commonly maintained are the journal fiII e, reference file,
and OB file.
Journal File . The journal file contains all previously recorded journal
sheets and supporting materials. Supporting material referenced on the
journal sheet is filed in chronological sequence. It includes copies of
orders, periodic reports, messages, memoranda, conference notes, map
overlays, and other material required to support the journal entries. Th e
journal number is annotated on the supporting document. The unit SOP
normally describes procedures for maintaining a journal. One good method
is to begin the annotation with the letter “J,” followed by the date and
an entry number. The fifth entry on June 23d would read “’J-23-05.”
2-7
DA » mov*M 1594 RRKVtOUS KDITIOM or THIS FORM IS OMOLITK. ^ ^
2-8
Reference File . The reference file includes all information that is not
of immediate interest but may be of future value. Information is
cross-indexed to permit easy retrieval.
OB File . The OB file is discussed in Chapter 3.
Working Situation Map
The working situation map (SITMAP) is the primary analytic tool at all
echelons. It is a temporary graphic display of the current dispositions
and major activities of the enemy. Information about friendly forces on
this map usually is limited to boundaries; locations of command posts
(CPs) of higher, lower, and adjacent units; reconnaissance units; the
forward edge of the battle area (FEBA), and forward line of own troops
(FLOT) . The level of detail of the working SITMAP will be proportionate
to the echelon at which it is maintained.
Generally, enemy maneuver units are posted which are two echelons
below that of the friendly unit. Enemy units, regardless of size, in our
rear area are always posted because of the amount of damage they can do to
administrative and logistical nodes.
Enemy headquarters (especially regimental and higher levels) and CS
and CSS asset locations are also posted. The SITMAP reflects enemy unit
identification, disposition, and boundaries; major roads or trails for
movement of personnel, weapons, and equipment; and locations of, for
example--
"Automatic weapons (battalion SITMAP only).
"Supporting mortars (battal ion SITMAP only).
"Antitank guns (battalion SITMAP only).
“Artillery,
"Air defense artillery.
"Minefields.
"Roadblocks.
"Entrenchments.
"Obstacles.
"Defensive positions.
"Logistics and command facilities.
"Aircraft and helicopter staging areas.
"Nuclear, biological, and chemical (NBC) contaminated areas.
2-9
"Ground surveillance devices.
"Smoke screens.
When plotting enemy activities and dispositions, indicate the latest
time at which the activity was observed or the disposition confirmed. The
S2 ensures that the working SITMAP and supporting overlays are maintained
as simply as possible and that authorized conventional signs, mil itary
symbols and abbreviations are used. See FM 101-5-1 for authorized
abbreviations and map symbols. Explain any deviations from these symbols
in the marginal data on the map or overlay, Necessary classification
markings also must appear in the margins of maps and overlays.
Rather than attempting to plot all entries on a map by means of
conventional or Improvised military symbols, the S2 uses a number or
letter to plot the area where the activity was observed. A corresponding
letter or number then is entered into a space alongside the map and a
notation entered as to the activity observed. Use a number or letter that
is easily cross-indexed to the journal or message file for a complete
report. Ensure that the number or letter indicating an activity in the
journal file matches that on the working SITMAP (see “action taken” column
in Figure 2-4).
Care must be taken to prevent overcrowding the map, One method of
doing this is to group entries by categories on a series of acetate
overlays. Use separate overlays to display separate categories of
information. A typical separate overlay might show fortifications or
potential targets or details of OB. An enlarged sketch map also is
prepared to cover overcrowded areas. This allows the presentation of
additional details.
The working SITMAP (discussed in this chapter) and the OB SITMAP
(discussed in Chapter 3) are two separate items. Although the same types
of information are recorded on each, their functions differ. The G2 or S2
uses the working SITMAP for recording and analyzing. The OB SITMAP
normally is less cluttered than the working SITMAP.
Maintenance of the OB SITMAP at brigade and battalion levels usually
is a joint S2 and S3 action. At higher levels, each section maintains a
separate SITMAP. Plotting the friendly situation is the responsibility of
the S3, while the enemy situation is the responsibility of the S2. During
operations, personnel from either section map or plot friendly or enemy
entries on the SITMAP and perform other processing functions.
When the intelligence and operations staffs use separate maps, ensure
that acetate overlays are readily interchangeable between these maps.
This permits easy comparison of the current enemy situation (G2 or S2 map)
with the disposition of friendly forces (G3 or S3 map), and easy
comparison of enemy obstacles, barriers, and minefield with planned
routes of march.
Examples of separate SITMAP overlays are—
2-10
"Enemy fortifications.
"High value targets.
"Obstacles.
"OB data.
"Friendly reconnaissance patrols.
"Surveillance activities (include the ground coverage of each
system).
The maintenance of the working SITMAP takes precedence over ail other
recording means during combat operations. In a fast-moving situation,
particularly at the maneuver battalion level, it is the oniy recording
device used.
The working SiTMAP is continually purged of information that is not
current or otherwise no longer needed. Purging keeps it neat and
uncluttered, making it more useful as an analysis tool. Map overlay
tracings or periodic photographs of the SITMAP provide a permanent record
of the situation. These records provide a reference to past enemy
activity and help determine patterns of enemy movement and dispositions.
Use the working SITMAP to make sound tactical decisions; its primary
intelligence uses are to--
“Display the enemy disposition and situation.
"Provide a basis for comparison to determine the significance of
newly received data about enemy forces. IPB situation and event
templates provide a basis for comparison.
"Provide a background and basis for briefings and other required
intelligence reports.
"Provide the basis for overlays which graphically portray the enemy
situation.
"Assist in the determination of movement patterns of guerrilla or
insurgent forces.
"Show possible intelligence gaps which require redirection of the
collection effort. For example, the need to locate and identify
enemy units reported for the first time.
For secondary intelligence use, post the following information in the
margin of the working SITMAP or on charts or cards nearby:
"Computations of enemy personnel and weapon strengths and
weaknesses.
2-11
"Organization charts of specified enemv units.
"Summaries of weather and terrain data.
"A listing of PIR and IR.
"Notations about the current patrol plan.
"Movement computations.
"A listing of friendly attachments.
° Alisting of unlocated enemy units believed to be in the AO.
"Probable courses of action.
"Battle damage assessment (BDA).
Chapter 6 describes how the SITMAP is used in situation development.
Intelligence Workbook
The intelligence workbook contains information arranged by subject
heading. This arrangement helps to sort, evaluate, interpret information,
and prepare intelligence reports. It is not a permanent record and it is
not distributed to an outside agency. The workbook is kept current with
obsolete entries deleted. At higher echelons, analysts maintain separate
workbooks on various subjects.
There is no prescribed format for the workbook. At division and lower
headquarters, use index tabs to label information in the intelligence
summary (INTSUM). At corps and higher levels, use index tabs to label
information in the periodic intelligence report (PERINTREP).
Record incoming messages and reports; for example, information
concerning a newly identified armor unit could be recorded under index tab
3A, NEW UNITS, as well as index tab 2B, ARMOR. A message that furnishes
information on different subjects results in several entries: each entry
contains only that subject information. For example, a message containing
information on the locations of a reserve armor unit and an artillery unit
results in extracts under item 2B, ARMOR and under 2C, ARTILLERY. Base
each entry in the workbook on an incoming message and include a reference
to the journal serial number of that message. For example, J2, 091200
April, from 20th Engr Cbt Bn: “Bridge at LINDEN AB 910246 destroyed by
bombing. Estimated out of action for 30 hours.’” The J2 refers to the
journal serial number and the date-time group (DTG) entered refers to the
time of occurrence of the event. The intelligence officer makes written
comments on the evaluation of the information and its possible
significance following the appropriate entry.
Figure 2-5 shows a sample intelligence workbook which might be used at
corps and higher levels.
2-12
INTELLIGENCE (G2) WORKBOOK
a OTHER HEW TACTICS > WEAPONS
3A ORDER OF BATTLE NEW UNITS I
3B HEW PERSONALITIES |
3C ENEMY MOVEMENTS |
HEADQUARTERS.
PLACE:
CLASSIFICATION
3D FHFUV (TBCHCru /viai
2Z P’Hfcwwn 1 >mmj
31 ENEMY EQUIP. DESTROYED, CAPTURED |
1 3F ENEMY PRISONERS Of WAR 1
4 COUNTER INTELUGMCE
5 WEATHER
1
I TERRAIN
7A ENEMY CAPABILITIES
n enemy
7C CONCLUSIONS
Figure 2-5. Irttelligence workbook.
EVALUAT ION
Evaluation includes determining the pertinence of information, the
reliability of the source or agency through which the information was
derived, and its credibility. Evaluation of information at the lower
echelon is a simple step compared to the procedures employed at higher
echelons. From the viewpoint of the brigade or battalion S2, information
which relates to the unit’s AO and Ai is pertinent; information relating
to areas outside the area of interest may or may not be pertinent. The
brigade or battalion S2 may not be able to judge the reliability of a
source because the S2 may not have repetitive contact with that source.
This difference between higher and lower echelons is because information
received from higher headquarters normally has been processed, evaluated,
and interpreted and the information collected by organic agencies at lower
2-13
echelons generally is acquired by direct observation or actual contact
with the enemy.
Pertinence
pertinence is the examination of information to determine whether or
not the information is-
“Pertinent with regard to the enemy or to the battlefield area.
Information that relates to a unit’s AO or Al normally is pertinent.
‘Needed immediately, and if so, by whom? Of possible present or
future value, and if so, to whom?
Reliability
The source of information and the agency by which it was collected are
both evaluated for reliability. The principal basis for judging the
reliability of a source or an agency, other than troop units, is previous
experience with the source. Criteria for evaluating troop units include a
knowledge of their training, experience, and past performance.
The headquarters closest to the source or agency is ordinarily the
best judge of its reliability. Consequently, a higher headquarters
normally accepts the reliability evaluation performed by a reporting
headquarters. It does, however, consider the reliability of the reporting
headquarters itself.
Credibility
Credibility means the probable truth of the information. Judgment of
credibility is based on the answers to the following questions:
“Is it possible for the reported fact or event to have taken place?
“Is the report consistent within itself?
“Is the report confirmed or corroborated by information from
different sources or agent i es ?
“Does the report agree or disagree in any way with other available
information?
“If the report does not agree with information from other sources
or agencies, which one is more likely to be true?
The most reliable method of judging the accuracy of a report is by
comparing it with similar information which already may be available in an
intelligence file or workbook. When possible, the intelligence officer
obtains confirming or refuting information through different agencies and
from other sources.
2-14
Marked differences in the evaluation of the accuracy of information
may occur between higher and lower echelons. The reason for this
difference is because higher echelons, which have more sources of
information and intelligence than lower echelons, have a greater
opportunity to confirm, corroborate, or refute the accuracy of reported
data. Regardless of the source, reevaluate the accuracy of incoming
information and intelligence at each echelon. Thus, the role of higher
echelons in evaluating the credibility (or probable truth) of information
differs somewhat from its role in evaluating the reliability of the source
(again, usually done best by the echelon closest to the source),
The evaluation rating of each item of information is indicated by a
standard system. Reliability is shown by a letter; accuracy by a
numeral . The lowest headquarters possible assigns the evaluation ratings.
Indicate the reliability of the source and agency as follows:
A - completely reliable.
B - usually reliable.
c - fairly reliable.
D - not usually reliable.
E - unreliable.
F - reliability cannot be judged.
A rating of “A” indicates only the most unusual circumstances. For
example, this evaluation is given when it is known that the source has
long experience and extensive background with the type of information
reported. A rating of “B” indicates a source of known integrity. A
rating of “’F” indicates there is no basis for estimating the reliability
of the source.
Agencies ordinarily are rated A, B, or C. However, when the source
and the collecting-reporting agency are evaluated differently, only the
lower degree of reliability is indicated.
Indicate the credibility of information as follows:
1 - confirmed by other sources.
2 - probably true.
3 - possibly true.
4 - doubtfully true.
5 - improbable.
6 - truth cannot be judged.
2-15
If it can be stated with certainty that the reportsd information
originates from a source other than that for already existing information
on the same subject, it is classified as “confirmed by other sources” and
is rated “’I.”’
If no proof in the above paragraph can be established, and if no
reason exists to suspect that the reported information comes from the same
source as the information already available, it is classified as “’probably
true” and is rated “2.’
If the report is confirmed in essential parts by information already
available, it is classified as “probably true’” and is rated “2.”
If the investigation reveals that the raported facts, on which no
further information is yet available, are compatible with the previously
observed behavior of the target, or if the known background of a person
leads to the deduction that the person might have acted as reported, the
information raceived is classified as “possibly true” and is rated “3.”
Reported but unconfirmed information, which contradicts the estimate
of the development or the known behavior of the target, is classified as
“doubtful” and is rated “’4”’ if this information cannot be disproved by
available facts.
Reported information which is not confirmed by available data and
contradicts the experience hitherto assumed to be reliable with regard to
the development of a target or issue is classified as “improbable” and is
rated "5.” The same classification is given to reported information that
contradicts existing data on a subject originally given the rating “’I” or
“ 2 .”
If the investigation of a report reveals that a basis for rating 1 to
5 is not given, the reported information is classified as “truth cannot be
judged’” and is rated “6.”
The statement “truth cannot be judged” is always preferred ovar the
inaccurate use of ratings 1 to 5. If there is no sound basis for rating
1 to 5 because of the complete absence of other information on the same
target, it must be rated 6.
The Scale 1 to 6 does not represent progressive degrees of accuracy.
Recognition must be given to the rating represented by the numeric symbol.
Although both letters and numerals are used to indicate the evaluation
of an item of information, they are independent of each other. A
completely reliable agency may report information obtained from a
completely reliable source which, on the basis of other information, is
judged to be improbable. In such a case, the evaluation of the
information is A-5. A source known to be unreliable may provide raw
information that is accepted as accurate information, when confirmed by
reliable sources. In this case, a report is evaluated E-1. A report
evaluated F-6 may be accurate and should not be arbitrarily discarded.
2-16
A report disseminated to higher, lower, and adjacent units should
contain the evaluation for each item of information; for example, ‘“The
division artillery of the enemy 46th Tk Div can fire nuclear rounds of
0.5 kt yield (C-3).”
The evaluation and interpretation of information atthe brigade and
battalion is a simplified mental process: thus, the standard evaluation
rating has little if any application. This system assists the G2 or S2 in
processing information received from other headquarters and in evaluating
information disseminated to other headquarters.
ANALYSIS
The processing of information continues with analysis, which cons iSts
of three steps: assessment, integration, and deduction. It is during this
phase of the intelligence cycle that information becomes intelligence .
Assessment
Assessment is the sifting and sorting of evaluated information to
update significant elements with respect-to the mission and operations of
the unit. The first and most important step towards proper assessment is
a clear understanding of the unit's mission and the commander’s intent.
All information gathered is viewed in relation to what the commander wants
to accomplish. Assessment also requires judgement and a thorough
knowledge of military principles, the characteristics of tha AO, and the
enemy situation, to include enemy doctrine and past practices.
Assessment at headquarters above division level often involves
detailed research with greater difficulty caused by the increased volume
of information. Regardless of the level , individuals who assess
information must relate their efforts to the unit’s mission to avo id
wasted time and effort.
Integration
Integration is the combination of the elements isolated in assessment
with other known information to form a logical picture or hypothesis of
enemy activities or the influence of operational area characteristics on
the mission of the command. In the process, more than one hypothesis may
be formulated based upon existing intelligence.
Integration, particularly the development of hypotheses, requires the
same good judgment and thorough background knowledge essential to making a
good assessment. In formulating hypotheses, the intelligence officer
avoids preconceived opinions and hypotheses based solely on personal
experience or preference. The officer attempts to adopt the role ofthe
enemy commander in the development of these hypotheses.
After they are formulated, all hypotheses are analyzed and tested.
Analysis of an hypothesis includes determining the indications that should
exist if the hypothesis is a valid one. Testing includes verifying the
2-17
existence or nonexistence of these indications within the limitations of
available time and means.
Integration may be a mental process completed in a few moments or it
may be a lengthy process involving the collection of a large volume of
additional information.
Deduction
The last step in the analysis of information is deduction. Meaning is
deduced from the hypotheses developed; these are than tested and
considered valid as a result of integration. Deduction answers the
question: “What does this information mean in relation to the area of
operations, the enemy situation, and the friendly commander’s intent?” The
answer provides a useful conclusion which can serve as a basis for
determining future enemy courses of action and for keeping the
intelligence estimate current. Deduction should also answer the question:
“What does this information mean in relation to the enemy’s use of
tactical deception or counterdeception?" ‘The resulting answer reduces
friendly vulnerability to being deceived and the false belief that
battlefield deception operations are being believed by the enemy.
DISSEMINATION
The final step is to disseminate intelligence or information.
Dissemination is not limited to regular reports. Critical Pieces of
information are passed quickly to those who can use them. The G2 or S2
always is aware of this and prepares to use any form of communication,
from RATT to courier, to pass vital reports. Intelligence is of no value
on the battlefield when it becomes history.
2-18
CHAPTER 3
ORDER OF BATTLE
OB intelligence is an integral part of intel I igence analysis at all
levels. Intelligence analysts consider OB intel I igence. They integrate
it with other intelligence pertaining to weather, terrain, and other
METT-T factors to determine Threat capabilities, vulnerabilities, and
probable courses of action.
This chapter describes the OB analysis process and the tools used to
develop and integrate OB.
OB is the identification, strength, command structure, and disposition
of the personnel, units, and equipment of any foreign military force.
During counterinsurgency operations, or whenever they become militarily
significant, include guerilla and insurgent forces, associated agent nets,
and the insurgent auxiliary and support structure in the Threat data base,
Data is developed in many fields outeide the scope of OB, but all
intelligence is related ultimately to it. For example, technical
intelligence (Tl) produces intelligence on the capabilities of weapons
systems, but OB intelligence determines the effect of weapon capabilities
and characteristics on enemy tactics, combat effectiveness, and
organization.
ORDER OF BATTLE FACTORS
The OB consists of evaluated information on enemy, allied and neutral
forces, including--
0 Composition.
0 Disposition.
0 Strength.
0 Tactics.
0 Training.
0 Logistics.
0 Combat effectiveness.
0 Electronic technical data.
0 Miscellaneous data.
COMPOSITION
Composition is the identification and organization of units. It
appl ies to specific units or commands as opposed to type units. Unit
3-1
identification often is called the key to OB intelligence because it leads
to the answers to many questions concerning the enemy, Unit
identification consists of the complete designation of a specific unit by
name or number, type, relative size or strength, and (usually)
subordination. Through identification, the OB analyst develops a history
of the composition, training, tactics, and combat effectiveness of an
enemy unit. The identification of a specific unit within an organization
alerts the analyst to the possible presence of other unidentified or
unlocated units of the sama organization.
Organization is the physical structure of a unit and the relationship
of the various elements within the structure. Knowledge of the
organization of a unit or military force aids in developing accurate
intelligence on current strength, and combat efficiency. Further Threat
capabilities as they relate to tactics, training, and logistics are
difficult to assess accurately without knowledge of the current
organizat ion.
The basic self-sufficient tactical unit (normally a combat division)
is considered when developing intelligence concerning composition. In
some countries, the field army is considered the basic self-sufficient
tactical unit. In others, it is the regiment. The importance of this
concept I ies in the term “’self-sufficient.”’ Units subordinate to
self-sufficient tactical units, although capable of limited independent
action, cannot sustain themselves over relatively long periods of time.
Subordinate units seldom are employed independently or separately from the
basic self-sufficient tactical unit. For example, a new Soviet motorized
rifle regiment (MRR) is reported in the AO, Knowing that the division is
the Soviets’ basic self-sufficient tactical unit and the three MRRs of a
motorized rifle division (MRD) seldom are employed independently, the
presence not only of a new regiment but of a new MRD is given tentative
acceptance. When one of these regiments is located, suspect that the
remaining elements of the division also are in the area.
DISPOSITION
Disposition consists of the location of Threat units and the manner in
which these units are deployed tactically (or administratively in times of
peace) . In addition, disposition includes the recent, current, and
projected (or probable) movements of Threat units.
Location refers to a geographical area or position occupied by a unit
or units. Knowledge of the strength and location of a Thraat force
assists the intelligence officer in determining the capabilities of the
force and its effect upon the accomplishment of the friendly mission.
Data of this type is collected during peacetime and form the basis for
assessing capabilities during the initial period of hostilities.
Tactical deployment is the relative position of units with raspect to
one another or to the terrain. Tactical formations are designed for
executing the various tactical maneuvers and usually are based upon
doctrine. If this deployment is predetermined, it leads to an accurate
appraisal of probable Threat courses of action. The knowledge of how
3-2
units are arranged in echelon indicates (if the Threat assumes the
offensive) which units are used in the initial attack and which units are
employed in supporting and reserve roles. Tactical deployment with
respect to terrain also is important. A study of disposition with an
analysis of the terrain leads to conclusions concerning Threat
capabilities, vulnerabilities, and probable courses of action. Accomplish
this through the IPB process detailed in FM 34-130.
Movement of units is part of disposition. Movement is the physical
relocation of a unit from one geographical point to another. Patrol
activity may be an indication of planned movement but, in itself, is not
movement. Movement is significant because it automatically changes the
tactical deployment of the opposing forces. When a Threat unit has moved,
is moving, or possibly will move in the future, it becomes capable of
executing a number of actions which affect the conduct of the battle (or
the current political situation). Such a unit moves into an attack
position, moves to reinforce or to replace a unit, or performs other
missions. In view of these possibilities, movement of a unit becomes
important. The 06 analyst must continually monitor unit movements in
order to provide correct and detailed data on Threat dispositions.
STRENGTH
Strength describes a unit in terms of personnel, weapons, and
equipment. Information concerning strength provides the commander with an
indication of enemy capabilities and helps determine the probable courses
of action or options open to Threat commanders. A lack of strength or a
preponderance of strength has the effect of lowering or raising the
estimate of the capabilities of an opposing force. Likewise, a marked
concentration or buildup of units in an area gives the commander certain
indications of enemy objectives and probable courses of action. During
peacetime, changes in the strength of potential Threat forces are
important factors which may indicate changes in the enemy’s intention.
Appendix D describes enemy strength computations.
TACT ICS
Tactics in OB intelligence include tactical doctrine as well as
tactics employed by specific units. Tactical doctrine refers to the
Threat’s accepted principles of organization and employment of forces for
the conduct of operations. Tactics, on the other hand, describe the
manner in which units conduct an operation. From a knowledge of tactical
doctrine, the OB analyst knows how the Threat may employ forces under
various conditions and in certain type situations or special operations.
Units normally are expected to perform according to certain patterns
within the framework of their tactical doctrine. Ail Armies establish
basic principles and patterns for the employment of infantry, motorized
rifle (MR), tank, and artillery units in the offense and defense. Of a
more specific nature, special ized tactical doctrine a certain unit employs
in given situations during combat or training activities is analyzed,
because it indicates possible changes in Threat doctrine. Doctrinal
templating, as detailed in FM 34-130, is one method of graphically
portraying enemy tactics.
3-3
TRAINING
Individual and unit training contribute significantly to the combat
effectiveness of any military organization. The thoroughness, degree, and
quality of individual training which the recruit, specialist,
noncommissioned officer (NCO) , and officer receive are major factors in
determining the overall efficiency of an armed force. Unit training,
normally conducted in seasonal cycles from small unit exercises to
large-scale maneuvers, is an essential part of the training necessary for
a unit to operate at its full potential. Each type or phase of training a
unit accomplishes adds to its capabilities and effectiveness.
Specialized training that a unit receives may point to its ability to
undertake certain missions beyond its normal doctrinal capabilities or
responsibilities. Therefore, it is easier to appraise the combat
effectiveness of a unit when the degree and quality of its training are
known, as well as any specialized training it undertakes.
LOGISTICS
Logistics closely relates to combat effectiveness. The adoption of a
course of action depends on the abil ity of the logistical system to
support that action. With knowledge of the current capabilities of a
unit’s logistical support structure, make a more accurate evaluation of
its capabilities, strengths, and combat effectiveness. Also, the
locations of elements of a unit’s logistical support structure indicate
the disposition of maneuver formations and CS elements. Categories of
logistical information include--
O
All classes and types of supply.
® Supply lines of communication.
® Logistical requirements.
0 Procurement methods.
0 Distribution priorities and procedures.
0 Transportation networks and modes.
0 Installations and logistical control points.
0 Terminals.
0 Evacuation and salvage procedures.
0 Maintenance.
3-4
COMBAT EFFECTIVENESS
Combat effectiveness describes the abilities and fighting quality of a
unit. Numerous tangible and intangible factors affect it. Combat
effectiveness affects the capabilities of a unit or army and is predicted
by analyzing-
personnel strength.
"Amount and condition of weapons and equipment.
"Status of training.
"Efficiency of the officer and NCO corps.
"Quality of leadership.
"Length of time a unit has been committed in combat.
"Traditions and past performance.
"Personality traits of the unit commanders.
"Geographical area in which committed.
"Morale, esprit, health, discipline, and political reliability (or
belief in the cause for which they fight).
"Status of technical and logistical support of the unit.
"Adequacy of military schooling at all levels.
"National characteristics of the people.
ELECTRONIC ORDER OF BATTLE
Electronic OB information is required to conduct EW. This data
includes communications and noncommunications equipment parameters, such
as emitter type and nomenclature (including encoding equipment),
modulation, multiplex capability, pulse duration, pulse repetition
frequency, bandwidth, associated weapons systems, and other technical
characteristics of electronic emissions. They also include critical
communications nodes such as CPS and logistical control points. They
support Threat electronic order of battle (EOB) templating.
electronic technical data, a more accurate evaluation of the enemy’s
vulnerability to electronic countermeasures (ECM) and deception is made;
signals intercept and direction finding (DF) for the production of SIGINT
is made easier; and support is given to electronic counter-countermeasures
(ECCM) by assessing the threat EW capabilities.
3-5
MISCELLANEOUS DATA
Miscellaneous data includes supporting information needed by an
analyst to develop other OB elements. Miscellaneous data includes basic
intelligence described as "know your enemy.”
Personality files contain information on certain characteristics and
attributes which describe individual members of a military force. A
knowledge of personalities is important in identifying units and, in some
cases, predicting the course of action the unit will take. Personality
data, therefore, is valuable because the tactics and combat efficiency of
particular units are often closely related to key individuals within its
command structure.
Unit history includes information and intelligence on the elements of
a specific unit; on present and past parent units; personalities who have
commanded the unit; and other details like past performance and activities
which describe, limit, or clarify the capabilities of the unit concerned.
The development of unit history is important in determining the
capabilities and limitations of a unit. Military or paramilitary units,
like individuals, develop characteristics which distinguish them from
other units. Just as they consider the various qualifications and traits
of threat personalities, OB personnel also must consider a Threat unit as
a personality in analyzing its capabilities and limitations. Information
on uniforms and insignias is an important part of “’know your enemy”
intelligence. This information assists in establishing unit
identification and organization and in determining morale and esprit de
corps.
Some foreign armies use systems of code numbers, names or false
tactical markings to conceal true designations (or affiliations) of units,
field post numbers (FPNs) (unit mailing address), and vehicle
identification or side numbers. These systems, when properly analyzed,
are valuable sources of information that are related to unit composition
and disposition.
The OB analyst is able to recognize and appreciate the capabilities
and limitations of foreign weapons and equipment. Although technical
intelligence agencies are primarily concerned with the determination of
weapons and equipment characteristics and capabilities, the analyst uses
this intelligence to analyze the effects of these items on the
organization, disposition, tactics, and combat effectiveness of the
mil itary force.
ORDER OF BATTLE REFERENCES
THIS SECTION IMPLEMENTS STANAG 2077
Standard OB references are published by higher echelons during
peacetime. They form the basis for lower echelon OB efforts.
3-6
ORDER OF BATTLE BOOK
An OB book is a summary of all basic intelligence concerning the
composition, d isposition, identification, subordination, and strength of a
foreign nation’s military forces. It includes all units from the var bus
services that function in a ground or ground support role. It normally is
published at EAC by the service departments and by the DIA. Allied
nations, particularly the NATO nations, also publish OB books. The level
or echelon of units shown depends on the level of command for the intended
user. Generally, this is at least one echelon above and two echelons
below that of the intended user. During peacetime, units which form only
on mobilization are identified as such.
The OB book includes the following information for each unit:
"Identification, to include:
-- Numerical designator and type of unit.
-- Nationality (if more than one nation’s forces are included in
the OB).
"FPN.
"Subordination (parent unit)
"Subordinate units.
"Location, to include:
-- Place name (and country if deployed abroad).
-- Installation number or name (if applicable).
-- Military geographic region (if applicable).
— Universal transverse mercator (UTM) coordinates (supplement
with geographic coordinates whenever possible).
"Category and effective strength.
The following data also is included:
"Code name or code number (enemy assigns official name or number).
"Nickname (unofficial popular name).
"Honors or honor titles.
"Unit insignia.
"Latitude and longitude of subject (in addition to UTM
coordinates) .
3-7
"Commander’s name, rank, initials and specialty, and those of other
key personnel.
"Combat effectiveness (including any data on special ized training).
"Signature equipment.
"Turret numbers, vehicle registration numbers, or other tactical
identification signs.
“Any other data at the discretion of the originator for example ,
basic encyclopedia (BE) or target data inventory (TDI) numbers.
The structure of an OB book varies, However, it normally contains
three sections:
Section 1. General
Section I contains the table of contents, explanatory notes and
glossary of terms, acronyms, and abbreviations used in the document,
summary list of major changes since the document was last issued, and
summary chart of current dispositions.
Section ll 0 Detailed Order of Battle
Section II contains formations or un ts grouped according to their
subordination and echelon. For example, military district, region, front
level formations, and units follow immediately after the district, region,
and front headquarters to which they are subordinate. While the same
methodology is applied at all other leveils of command within a district,
region, or front formation, the inclusion of units subordinate to
regiments is optional. Units of unknown subordination are included at the
end of each district, region, or front and are identified clearly as such.
Section III. Sumneries or Supporting Documentation
Section III contains any additional summaries or supporting
documentation, such as maps. The use of orientation maps of the nations
dealt with in the OB book is an important visual aid, especially when the
units being dealt with are superimposed. For a large country like the
USSR, include an orientation map for each military district.
Annually issue or emend OB books. While the timing and degree of
amendment are left to the discretion of the originators, an amendment
normally is published when substantial changes to publ ished OB holdings
are detected. The date of information (DOI) for the contents of the OB
book is taken to be the information cut-off date. Any amendments to the
OB book should indicate their own 001.
ORDER OF BATTLE HANDBOOK
The OB handbook, which is often referred to as a “handbook of military
forces,”’ is a summary of basic intelligence on a foreign nation’s
3-8
political or governmental structure and military establishment, including
its tactics and doctrine. It includes more technical data, such as the
logistical system used and the characteristics of weapons and equipment.
Like the OB book, higher US and allied commands publish the handbook.
The OB handbook normally deals with only one country. It deals with
two or more countries in separate parts, especially when these countries
are closely associated with each other by pact, geographically, or in some
other way. As a minimum it contains—
"History, governmental, and political structure. A short history
of the nation and a comprehensive description of its governmental
and political structure.
"Armed forces organization. A description of the nation’s military
establishment (including paramilitary and an expll anation of how C2
of the ground forces is affected).
"Ground forces organization. A complete explanation of the
organization and composition of all the various types of ground
force units and formations. The organization and composition of a
nonground force unit also is included if that unit is likely to be
placed under command or in support of the ground forces in time of
war.
"Logistical support organization. An explanation of the logistical
system the ground forces employs from ministerial level to the
lowest echelon.
° Strategic and tactical doctrine. An explanation of the nation’s
strategic and tactical military doctrine, especially at combat
levels of command.
“Reserve forces or mobi I ization. A description of reserve forces,
the mobilization system and times required for mobilization.
In addition, the OB handbook includes—
"Military education and training. A description of the military
education and training system and an explanation of the personnel
recruitment and selection process.
"Uniforms and insignia. A full description of all armed forces
uniforms, ranks, and insignia.
"Weapons and equipment. A listing and brief description including
characteristics of the various types of weapons and equipment found
in the ground forces. The list includes weapon and equipment’s
country of origin, availability of technical expertise, and
likelihood of resupply of equipment and spares.
3-9
° At lies. A list of likely military and political allies, and type
of support each may render.
The contents of the OB handbook are organized in the sequence shown
above. When included, organizational and tabular data are presented as
follows :
“Armed forces organization,, governmental and political structure.
Organizational charts are to support the narrative description of
these subjects where possible. There is no format for such charts.
“Organizational structure. Depict organizational structure for
each type of unit, Within NATO, the-symbols depicted in STANAG 2019
rapresent the various units, formations, or installations. Arrange
the organizational diagrams in the following sequence: headquarters,
combat units, CS units, service support units.
“Tables of personnel , weapons, and equipment. Produce the tables
according to STANAG 2077. Figure 3-1 shows a sample equipment list.
Amend OB handbooks periodically. The timing and degree of amendment
are left to the discretion of the originator. They should, however,
initiate amendment action whenever you detect a substantial change to
intelligence contained in the handbook or whenever you have a number of
minor amendments.
INSTALLATION HANDBOOKS
Ideally, installation handbooks contain complete information
concerning every military installation in every city in the county or Al.
They are useful, particularly during peacetime, for establishing which
forces are already in place. During wartime, the usefulness of
installation handbooks decreases somewhat. However, they still indicate
likely reserve mobilization and training centers. Two particularly useful
handbooks are the Automated Installation Intelligence File (AI IF) and the
Contingency Planning Facilities List (CPFL).
MISCELLANEOUS REFERENCES
Other publications and periodicals prepared at department! and area
command levels are of value to the OB analyst. These references may deal
specifically with OB or with any or all phases of tactical, operational,
and strategic intelligence. Specialized technical intelligence agencies
provide detailed evaluations of equipment. The Soviet Battlefield
Development Plan provides current and projected Soviet battlefield
capabilities. The CIA produces studies on general mil itary capabilities,
and economic factors which impact on military capabilities. Civilian
organizations under contract to the Department of Defense (DOD) make
special studies on various subjects concerning foreign and enemy military
forces. These studies usually are detailed, technical in nature, and
provide a wealth of special information not otherwise available.
3-1o
Equipment lists are to conform to the format shown above. The sequence and numbering of
equipment are to be established by Supreme Headquarters Allied Powers Europe (SHAPE)
according to STANAG 2077.
Figure 3-1. Equipment list.
ORDER OF BATTLE RECORDS
The OB analyst uses various recording aids in organizing and
cataloging OB information. The OB analyst creates OB records and files
through a compilation of information available in the references discussed
above. Subsequently, they are used continuously to produce current
intelligence and to update other intelligence records, like the SITMAP and
IPB products. OB files facilitate easy reference and comparison of OB
information collected at various times from various sources. Each
intelligence processing element decides which aids to maintain. The type
used depends on the echelon of command and the local situation. Some
common recording aids are:
"Unit workbook.
“0 B workbook.
"O B SITMAP.
“0 B card file.
0 Personal ity file.
"Military installation file.
° Organizational worksheet.
"Strength worksheet.
Other file systems or forms are developed locally for special
situations.
UNIT WORKBOOK
The format of the unit workbook depends upon the structure of the
foreign army being monitored. Typically, it consists of a collection of
OB cards supplemented by supporting documentation and is arranged by type
of unit or in numerical sequence. Minimally this documentation includes
organization and strength worksheets with the workbook being updated as
new information is received. The enemy parent unit listed on the unit
worksheet should agree with the analyst’s level of command.
The analyst normally maintains records for enemy units one level above
and two levels below the command’s. In some special purpose units, three
levels or more down are followed as well. Review information from units
three levels down to develop identities on units two levels down. List
personalities on the worksheet as a ready reference to the personalities
of the enemy unit. Note and use unit, postal, and vehicle numbers on the
worksheet to determine OB changes or to confirm current data. Note
details which may reveal any facet of the enemy unit’s OB or indicate the
source of information in the remarks column. Enter reports of branch
insignia, number and type of weapons, and statements of local residents in
this column in abbreviated form. Include the data and the source of
information for each entry. The installation column of the worksheet
shows the numerical designation assigned to a particular enemy
installation when plotted on a sketch, map sheet, or town plan attached to
the workbook. For consistency and to facilitate exchange of information
between headquarters, use installation numbers Previously assigned by
theater or MACOM, Figure 3-2 shows a sample unit workbook. Figure 3-3
shows a sample page from the unit workbook.
ORDER OF BATTLE WORKBOOK
The OB workbook aids the analyst in sorting, evaluating, and
interpreting information and in preparing intelligence reports.
3-12
CLASSIFICATION
UNIT WORKBOOK
ASPS, X CORPS
CLASSIFICATION
headquar ters
FRONT HQs and TROOPs]
1 CAA
2 CAA
1
3 CAA
1 TANK ARMY
107 MRD
3 TANK DIVISION
5 TANK DIVISION
ARTILLERY BRIGADE
SAM BRIGADE
SSM BRIGADE
MISCELLANEOUS
5 MRD
tt
7 MRD
Figure 3-2. Sample unit workbook.
There is no prescribed format for the OB workbook. At corps level and
higher, the OB workbook is tabbed to conform with paragraphs of the OB
annex of the PERINTREP (see Appendix A). This makes it easier to extract
needed information for the production of intelligence reports.
Information is entered under the appropriate haading or headings as
either a complete report or a digest of the original report. All entries
contain a journal date and number in addition to identification of the
source. Comments added after each entry show the significance of tha
report when compared with the overall tactical situation. Figure 3-4
showa how information is organized in an OB workbook.
3-13
Parent Unit
SUBORDINATE
UNITS
CITY
COORDINATES
INSTL
PERSONALITIES
ID OR
CODE NO
REMARKS
Dlv Hq
Stein
PV818147
1 and 3
Commander
COL Crechin
EPW no 26,
Captured
2 Feb 68
96 Mech Rifle
Regt
Delltach
PU820934
4
Commander
COL Kurtheve
16181
Document
Captured
19 Mar 68
145 Mech Rifle
Regt
Ellenburg
PU852961
2
LTC Shrenko
16182
Deaerter
21 Mar 68
3d Bn
Glad bach
PV891024
1
Gladbach
residents rpt
battalion
subordinate
to Hqs In
Ellenburg,
3 Feb 68
43 Med Tk
Regt
Linburg
PV863106
3
Commander
COL Reshvic
Agent Report
26 May 68
358 Trans-
Bn
Lehrt
PV825158
1
16195
OB Bank
Figure 3-3. Sample page from unit workbook.
ORDER OF BATTLE S I TUAT ION MAP
The 06 SITMAP is a graphic portrayal of current threat OB, either
confirmed or unconfirmed. It shows identification and disposition of the
opposing units and any other information which will assist in developing
the threat 06.
As a general rule, threat units one echelon above and two echelons
below the analyst’s own level of command are plotted by using the
appropriate symbols in FM 101-5-1. For example, division plots maneuver
regiments and battalions; corps plots maneuver divisions and regiments.
Plot higher units to tha extent practicable. The foregoing information is
only a guide. Analysts at theater level who are responsible for
publication of OB books may plot separata battalions. Peculiarities of
unit organization, the tactical situation, and time and personnel
available within the analysis section determines more precisely what is
plotted and what is omitted on OB maps. Enter the time and date of the
information to the left of each symbol or plot. During counterinsurgency
operations, however, it may be necessary to plot guerilla or insurgent
units down to the squad level, since, depending on the situation and the
3-14
CLASSIFICATION
COMPOSITION
area, there may be no larger units operating against friendly forces.
Figure 3-5 shows the OB SITMAP. The OB SITMAP contains the same types of
information as the working SITMAP (described in Chapter 2), except it is
kept in a less cluttered state so it is better integrated with G3 or S3
operational maps and for briefing purposes. At battalion and brigade
levels, S2 and BICC officers often do not keep separate working and
briefing OB SITMAPS.
Prepare the OB SITMAP as an overlay. Like other overlays, the OB
SITMAP contains titling data. This data includes:
0 Overlay title.
3-15
041430
XX
HI
m.
Located Units (by type)
Unlocated Units
Committed Forces
Unit
No.
Wpn
Recon Bn, 38th GMRD
114th Tk Rqt, 38th GMRD
MRb
6
Ul Ind Tk Bn, 38th GMRD
TB
2
80 T-64
SSM Bn, 38th GMRD
Reinforcement
MMR
1
TR
1
94 T-64
ITB
1
51 T-64
Fire Support
SSM Bn
1
SS-21
Arty Bn
8
18xBM-21
MRL
18x152mm
SP How
72x122mm
How
36x122mm
SP How
Figure 3-5. Order of battle situation map with caption box.
3-16
"Map sheet name.
"Map sheet number.
"Map series.
"Map scale.
0 Prepared _.
A caption box on the OB SITMAP is an annotation containing information
which helps to identify and explain the OB situation graphics. Although
any number of caption boxes are used, normally three types are necessary:
strength, unlocated units, and legend.
The entries in the strength caption box usually consist of strength
computations in numbers of personnel, types of units, and weapons and
equipment categorized as committed forces, FS, and available
reinforcements. Reconnaissance elements which are part of an opposing
maneuver unit are considered as reinforcements, if uncommitted.
Assumptions like these are made to portray probable enemy capabilities.
The OB analyst must be aware of what is not known about the enemy.
The unlocated units caption box lists existing unlocated units. These
units pose a threat to the accomplishment of the friendly mission, and
maximum effort must be directed toward establishing the disposition of
unlocated units in the AO.
When it becomes necessary to improvise symbols for enemy units,
include a legend caption box on the OB SITMAP. Within this caption box,
explain the exact meaning of each, improvised symbol.
ORDER OF BATTLE CARD
The analyst uses OB cards to maintain complete and accurate data on
enemy units. The format of the card is standardized within NATO to
facilitate the exchange of information and intelligence among allied
forces. The standard recording system (whether manual or automated) is
based on a card entitled “’Order of Battle Card.’” Such cards are
maintained in wartime, at all levels including division and lower when
directed by higher headquarters or when desired. Normally, keep one card
for each enemy regiment and independent battalion within a friendly unit’s
AI.
Information on the OB card includes--
"Identification (numerics) designation, type of unit, and
national ity) .
“FPN .
"Subordination (parent unit) .
3-17
Subordinate formations or units.
0 Location (place name and UTM coordinates).
0 Table of major equipment (including war establishment and current
effective strength).
0 Combat effectiveness and category (where applicable).
The OB card contains the following optional information:
"Code name (offical name assigned by the enemy for convenience or
as a cover) .
"Honorific title.
0 Nickname (unofficial popular name).
0 Insignia.
0 Commander.
0 Unit history.
0 Signature equipment (including significant quantities).
0 Turret numbers, vehicle registration numbers or other tactical
identification signs.
"Miscellaneous.
Record validity dates and source references on the back of the card.
Also record information subject to frequent changes on the back of the
card. This includes-- ,
"Unit locations.
"Strength.
"Combat effectiveness.
Figure 3-6 shows the front and back sides of the 08 card.
PERSONALITY FILE
A personality file records personality data on designated categories
of individuals. The development of the personality file is probably one
of the most difficult analytic functions, particularly for the personnel
in Threat units at division level and below.’ However, much information is
available through open-source I iterature and intelligence information
reports (HRs). This file provides reference material used in the
development of other OB intelligence. Information on key military figures
3-18
Figure 3-6. Order of battle cards.
(Front)
BASIC COMPOSITION OVERALL LIST
1. Tactical Symbol
0
2. Formation or Unit
3. Superior Formation
or Unit
4. Nickname
5. Insignia or Personnel
Equipment
11 5 GTR
6. Initial Strength
7. Code Number
8. Code name
9. Location
10. FP Number
$5 %
11. Coordinates (UTM)
12. Commander
13. Nationality,
Formations or Unit
14. Effective Strength (%)
15. Combat Effectiveness
IT. o
LTL MPfctLV
Yakov
UR
8*-
S5%
Consecutive
Number
Subordinate
Units
Location
Coordinates
(UTM)
Installation
FP Number
(Date)
Code Name
or
Code Number
Commander
Initial
Strength
Effective
Strength
a.
b.
c.
d.
a.
1.
9-
h.
1.
I-
dx
i OTtt
HB9S
7L WB
Pft 1*5*1
n(V5
Son&tocw
P5 uVIHt
Vh5K
History:
Miscellaneous:
Back)
Figure 3-6. Order of baffle cards (continued).
3-20
is of significant value in the establishment of unit identification,
tactics, and combat effectiveness. Keep the file in alphabetical order.
The card (or sheet) contains information concerning the individual’s
name, rank, current assignment, date and place of birth, civilian
education, political affiliation, nicknames, and physical peculiarities.
The file also contains the individual’s schools, qualifications, awards,
decorations, chronology of assignments, campaigns, engagements,
demonstrated performance in leadership assignments, and important
activities participated in, as well as character traits I ike morals,
reputation, appearance, and mannerisms, published articles (which may
identify areas of concentration and expertise), and cliques with which the
individual is associated (may indicate influences and upward mobility
prospects). Each entry records the source and date of the information.
The personality file also includes information which aids the friendly
commander, G2, and G3 in deception planning and operations. This includes
habits that make the opposing commander and staff vulnerable to deception,
the most likely deception targets, the degree of freedom the cormmander
allows subordinates, how the commander reacts to new situations, and how
the fear of the unknown influences the commander’s actions. Figure 3-7
shows a suggested format for biographies used in personality files
required by STANAG 2077. Similar files may be maintained for key staff
officers and other categories of key personnel.
A. Name.
B. Date of Birth.
C. Place of Birth.
D. Civilian Education.
E. Military Education.
F. Foreign Languages.
G. Medical History.
H. Personality Traits.
I. Foreign Travel.
J. Other categories of Information as deemed appropriate.
Figure 3-7. Biography.
3-21
MILITARY INSTALLATION FILE
During peace time, higher echelons maintain military installation
files normally to facilitate publication of installation handbooks. A
collation or explanatory sheet contains all information that has bean
collected on each installation to include the number and types of
buildings and their capacities, personnel uniforms and insignia, and major
items of unit equipment. Maps, town plans, or sketches showing the
location of each installation within the city supplement this file.
Figure 3-8 shows a sample military installation file.
ORGANIZATIONAL WORKSHEET
The organizational worksheet provides a convenient method of showing
types of units within an armed force. Organizational worksheets depict
the complete breakdown of all units from the highest type headquarters to
the lowest unit, including personnel and major wsapon strengths. Since
this is rarely possible on a single sheet of paper, prepare a chart
showing the general organization of the major unit and individual charts
for each of its subordinate units. Prepare principal weapons and
equipment charts to supplement organizational charts. Figure 3-9 shows a
sample MRR organizational worksheet.
STRENGTH WORKSHEET
Use the strength worksheet to maintain a running numerical tabulation
of the enemy’s personnel and equipmant strengths. This information is
recorded on committed units, FS units, and reinforcements. Figure 3-10
shows a sample strength worksheet.
COORDINATE REGISTER
When personnel and time are available, the brigade and battalion BICCs
maintain a coordinate register. The coordinate register provides the
lower echelon intelligence officer with a workable counterpart to the
extensive intelligence files and workbooks that are maintained at higher
echelons. It graphically illustrates the situation over a small
geographical area. It is compact enough to be carried with ease for ready
access.
The register is usually a looseleaf notebook. Each page represents a
single grid square on the operational map which covers the geographical AO
and Al. This geographical area should include the enemy area, friendly
area, and areas of concern on both flanks.
The coordinate register contains two types of pages. One type is for
written entries which describe enemy activities, locations, weapons, and
similar items. The DTG and map coordinates precede these entries. The S2
adds personal comments or notations to any entry. Figure 3-11 shows a
coordinate register page with written entries.
3-22
3
M
M
n
D
J
3
•s
•>
3
r
3
3
3
S
LU
X
N
OC
LU
s
LU
X
z
5
o
“ "
■
a>
s
_ E
c
■
1 i
i s
„ £
o
X
M
l|!
s 8
e-?
if.
X
a
<
2
w
2 o e
5 S
*- £ x
£ * c
® • «
Z • c
o *
ii
s.
*1
£* o»
t H
t ■ s “
if; s
&- y
i “I
iS|
>5 °
S J£ S
>. ■
4> M
"O —
i!
£ £
hs
|S
C ? O -
o -E a>
B *°
2
to
CO
a.
0
-j
<
cm
N
CM
CM
CM
co
£
0
6
CD
0
<
0
ik.
tn
3 g
0758
0758
0458
0458
1257
0458
1257
UJ Z
2 “
K
<c
UNIT
Unk
Engr?
Unldent
lied
Army
1st Bn
19th MR
I
h
a
z
UJ
M
C
r-
8
o
c
3
co
CD
0
in
>•
“
t-
o
o
<
a
o
o
§
j ■
h*
<
5T
m
0
' '
8 £
o
UJ
in
- o
M
a
w
a
c jc
«
a
i e
D
3 X
K
a 3.
H
* '
< -o
M «
J* p
1 *
Z
O
K
a
f |
i
li?
•O * *
5 3
is
n to
o
* T3
. «
• ®
£ 2
.* «°
o -w
1 o
• cJ
. £
4)
O.
2*
•
ai
«
«
O)
■3
£
O
g
a
3
M
* W
u a>
« c
1 “
Sr
erground bun
by 8' barbed
uard towers,
n each corner
cc
£ • t
? C
tf
t
£
• C
?«o»
o
(0
UJ
S « .c
£ 3
• O •
t o
W 3 C
O »
• «
O
»
• O)
O
•
CO
si
3 S *>
•= O «i *
S “ e 8
<0 u. S>
X m S
X 5
x B
X
n
£ £l 8
m
*
iO
CM
_j
<n
z
o
ao £
i 55
£ c -■
m
00
m
<
o
o
5232
201-4
SI)
« ? S'?
sli S
CM
w-
CO
in
5332
(N o
ntll 3
CM
in
CM
in
CO
in
N
m
-J
w X
-J
K
z
CM
CO
m
CO
r*-
Figure 3-8. Military installation file.
3-23
PERSONNEL
TANKS
ARTILLERY |
ADA j
"_ 1
SMALL ARMS
122mm
120mm
SA-9 flsA-7 1
ZSU
ATGM
ATGL
AGS 17
LMG
SP How
Mort
23-4
Regt HQ
65
3
3XMRB *
1290
18
27
99
18
108
Tk Bn
165
40
2
SP How Bn
220
18
18
18
AA Missile
Artillery Bn
60
4
4
AT Missile Btry
40
9
9
Recon Co
55
4
3
Engr Co
60
4
Sig Co
50
Cml Def Co
35
Mtr Transport
70
Co
Maint Co
70
4
Medical Co
25
Supply and
Service Pit
20
TOTAL
2225
40
18
18
4
30
4
9
140
18
129
* Strength and
equipment figu
res are ci
imulative.
Figure 3-9. Organization worksheet motorized "rifle regiment.
3-24
3-25
U
(Q
c
3
u
I
to
3
3
<Q
s
o
XT
W
3 1
<D
(D
H
at
3
TJ
<D
111th Guards Motorized Rifle Equipment
Category
Personnel
Tanks
Artillery
APC or
IKT
Remarks
Type
T-64
122mm
How (2S1)
152mm
How(2S1)
120mm
Mort
BMP-1
i. Committed
Forces
Losses
Full
Str
Losses
Full
Str
Losses
Full
Str
Losses
Full
Str
Losses
1st MRB(-)
50
13
6
2nd MRB(-)
35
13
6
RSI
2. Reinforcements
3rd MRB
10
6
4th TB(-)
10
14
3. Ftre Support
Arty Bn or 111
GMRR
18
18
Totals
105
40
11
18
3
18
0
18
3
Note: Additional columns and rows may be added to encompass additional unit or weapons systems.
| TEM
LOCAL
TIME
COORD
GRID SQUARE 32U NA2815
STATEMENT
NOTES
H
092235
28381539
MG fires on recon pit from A Co.
Have next pit check this area.
2
092318
?
Veh noise - Tk? - Heard direct N of
A Co OP 2 28321507.
Ask air OP to look
3
100600
Special OB report on wpns
and fortifications.
Div wants more info on
wpns strength.
280215323 to
28141527
Trenches and bunkers.
281415227 to
28221529
Wire.
28611545 to
28781551
Platoon on line has 2 MG’s.
Same MG as yesterday?
Check this!
28811551 to
29001599
Extensive trenches and firing PSNS.
4
102335
28391530 to
28691541
B Co pit rpts wire and AP mines.
New since 081800.
5
110600
28431588
Res unit (co?) in general area.
(From Div PIR).
6
110630
28381557
Med tk spotted by L plane.
How many more?
■
111320
28731584 and
28151564
Active mortars.
B
120010
28611564
Flash from small cal arty not over
75.
AT? AA? Gun? RR or
bazooka? Ask higher HQ.
Figure 3-11. Coordinate register with written entries.
The second type schematically represents a single grid square.
Entries are plotted on the square in the same manner used to plot the
enemy SITMAP. This page shows graphically any data applicable to a single
grid square. Figure 3-12 shows how an enlarged grid square is drawn and
entries are made.
The coordinate register is used to--
“Determine enemy dispositions and routes of movement.
"Predict enemy intentions and main effort.
"Plan reconnaissance and surveillance (R&S) operations.
“Brief and debrief patrols.
3-26
“Plans FS.
“Brief the commander and staff.
“Assist in IPB.
“Reveal enemy perceptions of how the terrain will sup port maneuver
against them.
Data from the coordinate register is plotted on a vert j c a I aerial
photograph that has been annotated with grid lines. A sea le of 1:25,000
3-27
or larger is desirable. By plotting selected OB information on the photo,
an analysis of the terrain is conducted simultaneously with a correlation
of information on the enemy. The photo provides an excellent means of
briefing commanders down to platoon level on the AO and the enemy
situation. Targeting is accomplished in a more precise manner by using a
photo instead of the traditional 1:50,000 map. While not common in mid-
to high-intentsity conflict these photos are especially useful in LIC.
The coordinate register is reviewed when the unit moves to a new area,
when new data is added, and when obsolete data is deleted. Timely
maintenance of the coordinate register is not practical in fast-moving
high-intensity situations like pursuit, delay, and exploitation. The
coordinate register would, however, be very valuable in a relatively
static situation or in a low-intensity conflict (LIC).
Whenever possible, maintain the register on strong semitransparent
bond paper. The transparency of bond paper is sufficient to allow the use
of a grid scale underneath the schematic page. This allows a more
accurate and rapid plotting of, or reference to, the entries.
The scale of the schematic page normally is a matter of SOP. Such
standardization assists in dissemination of intelligence data from higher
to lower echelons. For security reasons, the friendly situation normally
is not plotted in the coordinate register.
ENEMY COMBAT EFFECTIVENESS
A number of factors, some tangible, others not, determines the combat
effectiveness of enemy units. Of these factors, only the personnel and
equipment strength lend themselves to factual analysis, and only major
items of equipment, like tanks, armored personnel carriers (APCs), and
artillery weapons lend themselves to detailed quantifiable analysis. This
is because personnel strength fluctuations are extremely difficult to
assess accurately. Appendix D describes procedures for computing
personnel and equipment strength. The following states the combat
effectiveness of a unit:
“The 133 MRR is estimated to be at 80 percent effective
strength. Evidence of low morale suggests that the unit is
less combat effective than the estimated effective strength
may indicate.”
ARBITRARY UNIT DESIGNATORS
The identification, by title, of a particular unit or formation on the
battlefield is difficult during war. Although it is argued that such
precise identification is not important and that one enemy division is as
much of a threat as another, this ignores the problems of collation,
dangers of double counting, and comfusion. To deal with this problem,
NATO and national formations apply a unique arbitrary unit designator
(AUD) to unidentified enemy format iens.
There are two types of unidentified enemy formations:
3-28
"Formations which are well known except for their actual title.
“Formations seen on the battlefield whose history, background, and
title are unknown.
SHAPE allocates the AUDs. They appear in NATO and national OB
summaries in peacetime in the columns normally filled by unit title. Use
these AUDs in war also.
The AUDS consist of a prefix, a number, and a suffix.
The prefix consists of a three-digit alphanumeric distinguishing code
that indicates the number and nationality of the corps that originates the
AUD. The following are examples:
“The 1st British Corps uses IUK.
“The 2d German Corps uses 2GE.
“The 7th US Corps uses 7US.
A two-letter distinguishing code indicating the NATO formation and
allocating the AUD is an optional method of establishing prefixes.
Figure 3-13 shows these AUD prefixes.
Each national corps allocates blocks of numbers between 000 and 999 to
their own headquarters and subordinate formations. Similarly, divisions
may, if they wish, suballocate numbers to their subordinate formations.
Al I formations of a corps and corps headquarters, however, use the same
pref lx.
After the prefix and number is a suffix indicating--
“The nationality of the enemy formation.
“The type of formation.
Do not change the actual numbers allocated by a particular national or
NATO formation normally unless an unidentified enemy is recognized
separately by two formations, each of which allocates its own AUD. Under
such circumstances, the relevant superior headquarters, having agreed that
an unidentified enemy formation is present, will either--
“Accept one of the already allotted AUDs, but replace the prefix
with its own.
“Allocate a new AUD.
In either case, inform both of the originating formations.
As an example of an unidentified enemy with two allotted AUDs, a
division of the 2d German Corps and a division of the 1st British Corps
separately detect the presence of an unidentified Soviet MRD in the area
3-29
SHAPE .SH
AFNORTH.AN
COMNON .NN
COMSONOR. SN
COMBALTAP . BA
COMLANDJUT. JA
COMZEALAND . ZE
AFCENT. AC
NORTHAG. NG
CENTAG . CG
AFSOUTH . AS
LANDSOUTH . LS
LANDSOUTHEAST.SE
AMF(L).AM
Figure 3-13. Arbitrary unit designator.
of the intercorps boundary and each gives it an AUD using the block of
numbers al located to them by their own corps (2GE369 UR MRD and 1UK473 UR
MRD, respectively). Each corps adopts the AUD allocated by its division.
The corps HQ knows from which division the AUD originated by the
number appl ied. HQ NORTHAG agrees that an Ul UR MRD is present and
decides to retain the German (GE) number but allocates it a NORTHAG
prefix. From then on, until positively identified or changed by Allied
Forces, Central Europe (AFCENT), or SHAPE, the unidentified formation is
known as NG369 UR MRD. If for some reason it is changed by AFCENT or
SHAPE, apply an AFCENT or SHAPE prefix.
3-30
CHAPTER 4
INTELLIGENCE PREPARATION OF THE BATTLEFIELD
IPB is a tool to aid the commander and staff in determining where and
when to use limited resources to achieve decisive results. IPB applies to
all ph ases of the AirLand Battlefield; close-in, deep, and rear operations
synchronization are all supported by the IPB process.
For planning the close-in phase of the operations, IPB provides a
guide for the initial allocation and employment of combat power. Through
event templating, it is possible to identify where the enemy probably will
thrust if attacking, or where the enemy will concentrate forces if
defending. Through terrain and weather analysis and templating
techniques, it is possible to determine where friendly forces can best
move, shoot , and communicate, and where to place friendly strength against
enemy weakness. During tactical operations, IPB supports the use of fire
and maneuver to achieve a tactical advantage. Event templating
facilitates following enemy forces and determining their probable course
of action. Decision support templates (DSTs) enable the commander to
apply combat power in a timely manner.
IPB is especially useful as a tool for planning and fighting the deep
operations. Through threat evaluation, enemy critical nodes and HVTS are
identified readily. Event templating determines the optimum time and
place to interdict the enemy to achieve maximum delay, disruption,
destruction, and when and where to achieve decisive exploitation of
identified weakness. it facilitates the identification and location of
deep targets in time to strike them at the optimum time and place in a
manner which constrains and causes the collapse of close-in enemy actions.
AirLand Battle concepts were introduced in Chapter 1 of this manual, and
an application of IPB and collection in deep operations and maneuver plans
is further explained in FM 34-130.
When planning rear operations, IPB allows the commander to efficiently
focus friendly efforts. Capacity and trafficability of supply routes are
identified. Avenues for the commitment of reserves become apparent, as do
the choke points which the enemy will attempt to target. The analyst
studies drop zones (DZs) and landing zones (LZs) and the air approaches to
them, and provides the commander information about the rear area threat.
The most advantageous locations for support areas can also be found. Al I
of this permits the commander to use friendly forces in the most
economical method possible, which frees assets for the close-in and deep
operations.
IPB is an essential part of staff planning. Initially, the G2 uses it
to develop intelligence about the enemy, weather, and terrain that the
commander and staff need to complete their planning. The analysis of the
AO and the intelligence estimate primarily embody this intelligence.
While IPB does not replace these documents totally, use it as an aid to
their development. It aleo converts much of the written material into
4-1
graphics which are understood easily, analyzed, and appl ied to the
planning process.
The intelligence estimate is a key to the decisionmaking process.
Through IPB, the estimate is presented in a graphic format. This enables
the commander and staff to see, rather than visualize mentally, where both
friendly and enemy forces can move, shoot, and communicate. It provides a
graphic data base for comparing friendly and enemy courses of action.
Weather and terrain overlays tell us not only where the enemy moves,
shoots , and communicates but where friendly units accomplish these
functions as well. Just as the G2 uses templating to determine enemy
courses of action, the G3 uses templating techniques to compare friendly
courses of action.
IPB helps the G2 determine—
“Where to look.
“When to look.
“What to look for.
“What to look with.
“What to expect to see.
IPB helps the G3 determine—
“Where to maneuver, shoot, jam, and communicate.
“When to maneuver, shoot, jam, and communicate.
“What friendly resources to maneuver, shoot, jam, and Communicate
with.
“What enemy assets to maneuver, shoot, and jam.
“What results to expect.
IPB is vital to the commander’s estimate and tactical decisions
regarding the concept of the operation because it produces an accurate
comparison of friendly and enemy capabilities and courses of action. It
enables the commander to see friendly and enemy vulnerabilities and
opportunities and to determine where, when. and how to support forces to
ensure success.
Successful preparation and application of IPB products depend on the
intelligence analyst’s ability. The intelligence analyst must know both
enemy and friendly maneuver doctrine; must understand what a mission
statement involves; and must focus efforts to support the mission. To
provide the commander with the intelligence required to make a high
quality decision, the analyst must also coordinate extensively with other
staff sections. These include the G3 or S3, the FSE, AD, engineers,
4-2
battlefield deception elements, and USAF weather teams. Other sections,
such as the G5 and G4 or S4 become involved in rear area IPB. Each of
these sections and others have data which are vital to IPB. Each of these
sections also has requirements which are filled by IPB. Use of this
manual and FM 34-130 helps the analyst succeed in supporting the commander
effectively.
IPB influences every stage of an operation and is continuous. It
begins with a staff estimate process, which involves interaction from all
the staff sections.. Because battlefield conditions and tactical
situations change, IPB must be dynamic. The products which result from
IPB are often perishable, and must be updated to remain val id. Figure 4-1
shows how the staff sections interact during the IPB process. Chapter 4
of FM 101-5 describes in detail why IPB is conducted prior to an
operation.
Conducting IPB and knowing how to apply its products, are two
different processes. This chapter explains how the intelligence analyst
utilizes IPB to assist the commander and staff in the successful planning
and execution of AirLand Battle. A more detailed description of the IPB
process is available in FM 34-130.
PURPOSE OF INTELLIGENCE PREPARATION OF THE BATTLEFIELD
The key to effective IPB application centers around the G2 or S2 staff
understanding what can be accomplished with it. Much time and effort is
expended without purpose if IPB is conducted in a vacuum.
The analyst’s objective when applying the IPB process is to reduce
battlefield uncertainties as they relate to terrain, weather, and enemy.
During the IPB process, the graphics produced aid the commander and staff
in planning and synchronizing more effective operations. IPB focuses the
S2’s intell igence collection effort where it is most effective. IPB also
assists the commander in the decision-making process. For a detailed
description of how IPB assists in decision making read Chapter 4,
FM 101-5. IPB helps the commander control the battle by describing what
the enemy’s most likely course of action is, including when and where it
will occur and how the enemy’s follow-on forces affect the battle.
In situation and target development, the IPB product shows the
commander when to most effectively attack enemy forces by fire and
maneuver and when to seize the initiative. Using the IPB graphics, the
intell igence analyst can identify and prepare the attack of HPTs as they
move onto the battlefield. This reduces the effectiveness of the enemy’s
forces, causing them to be disrupted and delayed, and presenting further
targets for maneuver or FS missions. In threat integration of IPB, the
analyst uses analysis models to forecast events on the battlefield.
The IPB process, if applied properly and with purpose, contributes
immeasurably to mission accomplishment. However, as with any predictive
instrument, IPB will never achieve 100 percent accuracy.
4-3
Figure 4-1. The planning process,
DEVELOPMENT AND USE OF INTELLIGENCE PREPARATION
OF THE BATTLEFIELD PRODUCTS
Graphics are basic to IPB analysis. Often intelligence is
communicated best with pictures. The analysis of the battlefield and the
intelligence estimate are not replaced, but merely assisted by graphics.
These graphics become the basis for intelligence and operational planning.
Currency is maintained through graphic renewal or update. Right now most
aspects of IPB analysis are prepared manually. Preparing graphics by hand
is slow and time-consuming. Properly prepared, graphics are relatively
simple and inexpensive to maintain. The benefits of graphic analysis and
display of intelligence are worth the initial investment of time and
resources. It is therefore incumbent upon the G2 or S2 to make maximum
use of available time and personnel to produce those graphics which are
most beneficial to the commander. Particularly at brigade and battalion
level, all personnel must be capable of conducting the IPB process.
Additionally G2s or S2s at each echelon should provide subordinate unit
S2s as many IPB products as possible. This saves time and permits the
subordinate level S2 to expand on higher level IPB products or produce
others unique to the unit mission.
The graphics produced during the IPB process have numerous purposes
and functions. A good analyst knows what to accomplish from each.
Terrain and weather factor overlays, for example, help depict the effects
of terrain and weather on potential friendly and enemy courses of action.
Further on in the IPB process, analysts produce four
templates--doctrinal, situation, event, and decision support. Figure 4-2
gives the description and purpose of each template. These templates help
the analyst to deduce and analyze enemy capabilities, predict their most
likely courses of action, identify information gaps, and determine TAIs.
In other words, the graphics produced during the IPB process help in
conducting analysis.
APPLICATION OF INTELLIGENCE PREPARATION OF THE BATTLEFIELD
The IPB process begins with the mission. Upon receipt of a mission,
the commander analyzes the situation and has the staff present a situation
update. From this initial information, the commander conducts mission
analysis and restates the mission. The commander then sets the staff
planning process in motion by providing planning guidance and intent. The
commander also determines initial PIRs.
Using the commander’s guidance, the staff begins to prepare their
estimates. The IPB process primarily takes place during the estimate
process.
The intelligence analyst considers the amount of available time and
the number of soldiers on staff who can conduct IPB. Giving due
consideration to resources, the analyst initiates the IPB process with the
intent to produce sufficient graphic products to assist the commander and
staff in their planning.
4-5
As a minimum, the analyst prepares a modified combined obstacle
overlay (MCOO), a situation template depicting how the enemy looks at the
most critical moment on the battlefield, an event template from which to
develop the R&S plan, and a DST.
The G2 or S2 applies IPB to assist the analytical process and
accomplish as much of the process as possible to support the commander in
what little time is available. Time is the analyst’s greatest enemy as
there is never enough of it. If there is time for only one situation
template, the analyst prepares the one most critical to the commander’s
mission. This is why it is so important for the G2 or S2 staff to
understand the commander’s intent. Time spent initially providing
guidance and establishing specific tasks for each member of the G2 or S2
staff who conducts IPB, goes a long way towards a more complete IPB
product which contributes to the commander’s successful mission
accomplishment.
TEMPLATE
DESCRIPTION
PURPOSE
WHEN PREPARED
Doctrinal
Enemy doctrinal deployment for
various types of operations without
constraints imposed by the weather
and terrain. Composition, formations,
frontages, depths, equipment numbers
and ratios, and HVTs are types of
information displayed.
Provides the basis for
integrating enemy doc¬
trine with terrain and
weather data.
Threat
Evaluation
Situation
Depicts how the enemy might deploy
and operate within the constraints
imposed by the weather and terrain.
Used to identify critical
enemy activities and
locations. Provides a
basis for situation and
target development and
HVT analysis.
Threat
Integration
Event
Depicts locations where critical events
and activities are expected to occur and
where critical targets will appear.
Used to predict time-
related events within criti¬
cal areas. Provides a
basis for collection opera¬
tions, predicting enemy
intentions, and locating
and tracking HVT.
Threat
Integration
Decision
Support
Depicts decision points and target areas
of interest keyed to significant events
and activities. The intelligence estimate
In graphic form.
Used to provide a guide
as to when tactical deci¬
sions are required rela¬
tive to battlefield event.
Threat
integration
Figure 4-2. Intelligence preparation of the battlefield templates.
4-6
BATTLEFIELD AREA EVALUATION
Battlefield area evaluation (BAE) as the first step in the IPB process
sets the stage for the rest of the process.
During the conduct of BAE, the intelligence analyst studies the
battlefield area to focus the IPB effort. The analyst studies the
battlefield to obtain a general feel for how terrain and weather affect
operations. The AO has been provided.
Delineation of the Al is done to direct a portion of the collection
effort (with support from higher headquarters) against enemy forces which
can directly influence the unit’s mission. The G2 and G3 or S2 and S3
determine the Al based on how much time the commander needs to react to a
threat. For example, if the enemy has the potential to enter the
battalion AO via one of the flanks, and the battalion reserve needs two
hours to move to most areas on the flanks, then based on an enemy
doctrinal advance rate of 6 kilometers per hour (kph), the analyst would
probably extend the Al on the flanks to at least 12 kilometers (kms). The
analyst must understand the mission, the commander’s intent, and both
friendly and enemy capabilities.
METT-T and the commander’s concept of the operation determine the Al.
Once the Al is established, the analyst informs higher command of the area
it covers so they can assist in collection.
During the BAE phase the analyst studies the battlefield to determine
significant areas and considerations to be studied in more depth during
the remaining IPB phases.
Terrain Analysis
The intelligence analyst has one primary objective when conducting
terrain analysis -- to reduce the commander’s battlefield uncertainties as
they relate to terrain. Terrain analysis emphasizes the use of graphics
to portray the effects of terrain on operations.
The G2 or S2 depicts via graphic products--
"Terrain which impedes or hinders maneuver and mobility.
"Terrain which does not restrict maneuver and mobility.
"Avenues of approach (AAs) and mobility corridors (MCs).
The lower the level at which the analyst works, the less time the
analyst may have to prepare terrain factor overlays. The analyst must
prepare those overlays which support the commander’s mission and intent.
This requires the G2 or S2 to prioritize and set time lines as to what the
analyst should accomplish.
4-7
Modified Combined Obstacle Overlays
The intelligence analyst prepares a MCOO. This overlay is a
combination of various overlays or if done as one overlay, then simply is
a graphic representation of what should be highlighted about the terrain.
It is based on OCOKA (observation and fields of fire (FofF), concealment
and cover, obstacles, key terrain, and AA and MCs).
Terrain analysis at division level and higher benefits from engineer
terrain teams or detachments attached to G2 staffs assisting in terrain
analysis. Time constraints may not permit receipt of engineer terrain
products by brigade and battalion S2s. The intelligence staff must train
in the conduct of terrain analysis to be capable of producing their own
terrain graph ics. Appendix E of this manual, Terrain Analysis in IPB,
provides the analyst basic guidelines for conducting terrain analysis.
For a detailed description of how to conduct terrain analysis refer to
FM 34-130.
Terrain analysis focuses on the military aspects of terrain known as
OCOKA. Chapter 4 of FM 34-130 provides a detailed description of OCOKA.
The following guidelines are important to the analyst when applying
OCOKA.
Observation and Fields of Fire . Observation involves the type of units
(both friendly and enemy) which are on the ground. The analyst asks
questions such as:
"To what degree does vegetation or relief obscure tha observation
of friendly or enemy units?
“How will the ground unit be observed from the air?
The analyst focuses on the time of attack or expected tima of enemy
penetration into the main battle area (MBA). Also the analyst considers
what night observation devices both forces possess. These factors impact
on the conduct of the battle.
Another important factor is how the friendly force looks from the
enemy’s perspective. This principal applies to all other OCOKA factors as
well. The distinction is made clear to the commander by providing details
versus generalities.
Observation also influences the capability for R&S and TA. In the IPB
context, this refers to optical and electronic line of sight (LOS). Many
battlefield systems require LOS to function effectively. These include
radios, radar, intercept and direction finders, jammers, direct fire
weapons, human vision, and binoculars.
Air defense (AD) TA and weapons require LOS from their positions to
air targets. The analyst considers the anticipated flight altitude
relative to the elevation of adjacent terrain.
4-8
The effects of terrain and weather on these systems influence the
commander’s view of the battlefield. What is important for the analyst to
consider when studying the terrain is to study it based on the battlefield
systems available to the commander and the threat. Again, because time is
limited, the analyst prioritizes those battlefield systems most critical
to the mission.
LOS overlays graphically illustrate the effects of terrain on friendly
and enemy observation and FofF. The horizontal visibility or FofF overlay
combines the LOS effects of vegetation and elevation features. The
relative capabilities of direct fire weapons, communications, and
collection and TA systems become apparent. This overlay assists in
identifying key terrain with greater precision. Figure 4-3 shows
horizontal LOS FofFs. This is the type of overlay that the engineer
terrain team prepares at division or higher. If assigned to brigade or
battalion level, the analyst requests this overlay for the Al.
Figure 4-3. Horizontal LOS fields of fire.
Concealment and Cover . Concealment is protection from observation or
surveillance. Cover is shelter or protection from fire either natural or
artificial. The analyst discerns the difference between concealment and
cover . The two are not combined when examining the terrain for their
effects. The analyst examines concealment to distinguish it from ground
and aerial observation.
4-9
The analyst decides the type forces which concealment may or may not
impact; for example, concealment may be good for soldiers on foot, yet
poor if riding in tracked vehicles.
The analyst addresses cover from direct and indirect fires. The
analyst identifies (particularly important at battalion level) points
within the AO where concealment and cover are critical to successful
mission accomplishment.
Obstacles. Obstacles, whether artificial or natural, are very important
considerations in the conduct of terrain analysis. Obstacles
significantly impact on a force’s ability to maneuver or move rapidly
through an area. The analyst should not assume that an obstacle for
friendly force units is an obstacle for threat units also. The wise
analyst examines obstacles separately from the point of view of both enemy
and friendly force units and acknowledges that obstacles are different and
impact differently depending on the type of battlefield operating system
that is used.
Key Terrain . Key terrain is any point or area on the ground whose control
or seizure provides an important tactical advantage. Any terrain which
increases a unit’s abil ity to apply combat power or decreases the
opponent’s abil ity to apply theirs is considered key terrain.
Decisive terrain is that terrain which, if not controlled or if
controlled by the opponent, significantly degrades the commander’s ability
to successfully accomplish the mission. For example: The Fulda River in
West Germany, and in particular the crossing sites on it, is considered
decisive terrain for US forces defending against Threat forces approaching
from the east. On the other hand, the Harm River, 6 km east of the Fulda
River, while it is considered key terrain for a unit in the defense,
probably is not considered decisive terrain because--
°The Harm River hinders enemy movement across it (particularly if
covered by fire); but it does not prevent movement because it is
narrower and easier to cross than the Fulda.
0 It is not an obstacle to movement because it is narrower and much
easier to cross.
Avenues of Approach and Mobility Corridors . AAs are routes by which a
force reaches key terrain or an objective. AAs are evaluated in the
following terms:
“Maneuver support potential .
“Access to key terrain and adjacent AAs.
“Degree of canalization.
“Concealment and cover.
“Observation and FofF.
4-1 o
"Obstacles.
MCS are subsets of AAs. MCS are areas within the AA which permit
movement and maneuver. They permit friendly and enemy forces to advance
or withdraw in doctrinal configuration, and to capital ize on the
principles of mass, momentum, shock, and speed.
The intelligence officer or analyst should not get caught up on
whether a piece of terrain is an MC. It is important that the analyst
identify, based on knowledge of friendly and enemy assets, routes which
either force will most likely use. Later in IPB, the analyst focuses
collection resources on them.
When determining AAs and MCs, the analyst uses the one-up, two-down
rule. The analyst determines AAs for enemy forces one echelon above and
MCS for forces two echelons below the level of command conducting the
analysis.
In determining AAs and MCS, the analyst keeps in mind the type force
for which they are developed, the unit mission, and the potential enemy
force mission. If an air threat exists the analyst develops air AAs. If
time is short, the analyst seeks assistance from higher commands. The
analyst may even involve the unit air defense artillery (ADA) officer.
The analyst carries the AA through the enemy’s immediate and
subsequent objectives. When on the offense, the analyst identifies
potential enemy counterattack AAs and if possible AAs within the AO for
friendly force units. The analyst also identifies MCS for friendly units.
In determining friendly AAs and MCS the one-down, two-down rule applies;
that is, the analyst identifies potential AAs for subordinate elements one
echelon below the command conducting the analysis and MCS for subordinate
elements two levels below. The battalion S2, for example, identifies
company size AAs and platoon size MCS.
TERRAIN DATA BASE DEVELOPMENT
The analyst compares terrain product requirements with the terrain
data base to identify gaps. In addition to standard topographic maps
covering the Al, the following sources are helpful:
“Current intelligence estimate and analysis of the AO from higher
headquarters.
“Special terrain studies and products prepared by US or
host-country agencies, special maps, charts, and geodetic studies.
“Current photography.
“Actual terrain reconnaissance.
TERRAIN FACTOR MATRIX DEVELOPMENT
The terrain factor matrix provides a guide for terrain analysis. The
matrix develops from an analysis process whereby terrain factors are
4-11
identified and correlated with specific types of combat operations and
battlefield functions. The terrain factor matrix assists the intelligence
analyst in identifying the types of terrain products needed. Figure 4-4
shows the terrain factor matrix.
COMBINED OBSTACLE OVERLAY DEVELOPMENT
When the terrain factor overlays are stacked and registered, the
uncoiored portion represents areas in which a force moves unimpeded. Also
highlighted are areas which facilitate a maneuver element’s ability to
shoot and communicate. The overlays show significant terrain features
that are further developed in the analysis process. Through graphic
terrain factor analysis, the terrain team and the S2 section focus on
terrain areas that are significant for further analysis.
FACTORS
FUNCTIONS
Surface
Configuration
(Slope)
Surface
Materials
(Soils)
Vegetation
Weather
Effects
On Terrain
Transportation
Obstacle
(Linear)
Built-up
Areas
Surface
Drainage—
(Hydrology)
(Observation and
Fields of Fire
X
H
X
X
X
H
Concealment
and Cover
X
X
X
H
Assembly
Areas
X
X
X
X
X
X
Key Terrain
X
X
X
X
X
(Ground Avenues
Of Approach
X
H
X
X
X
H
■
X
Air Avenues
of Approach
X
X
X
X
H
■
X
Weapon Sites
X
X
X
X
X
X
X
X
DZ and LZ
X
X
X
X
X
X
X
X
Maneuver
X
X
X
X
X
X
ma
X
LOC and MSR
X
X
X
n
Barriers and
Fortifications
X
H
X
X
X
H
X
Line of Sight
X
X
X
a
Communication
Sites
X
n
X
X
X
H
EW Sites
X
n
X
X
X
n
a
1
E
Figure 4-4. Terrain factor matrix.
4-12
The combined obstacle overlay incorporates all pertinent terrain
factors which assist the analyst in identifying mobility areas and
deducing trafficability rates for AA analysis.
Figure 4-5 is an example of a combined obstacle overlay. The overlay
is particularly important because it integrates al 1 obstacles into one
graphic display. This greatly simplifies further analysis of AAs and MCS.
Crosshatching indicates the obstacles and the blank areas indicate freedom
of movement.
Figure 4-5. Combined obstacles overlay.
The effects of weather on mobility should not be ignored Through the
cooperative efforts of terrain and weather teams, weather eff ects are
integrated with the terrain analysis. As a result, the comb ned obstacles
overlay reflects average weather-induced terrain conditions. Excessive
precipitation affects soil density, slope, river stage, and visibility.
Cloud cover (CC) prolongs the drying period. Normal SLOW-GO traffic
conditions may convert to NO-GO conditions which impact on both friendly
and enemy force movements. The intelligence analyst prepares combined
obstacles overlays that reflect at least normal weather effects on
mobility. Based on a review of historic weather patterns, the analyst
associates specific weather factors with specific time periods.
Figures 4-6 through 4-8 show—
"Obstacles with dry soil.
4-13
"Obstacles created by wet soil.
"Combined obstacles w ith wet soil.
The combined obstacles overlay provides a basis for identifying AAs
and MCs. Having determined where the enemy cannot move without
difficulty, the analyst focuses attention on those areas where the
opposing force can move. Figure 4-9 shows normal requirements for
identifying AAs and MCS.
<f &
COMBINED OBSTACLES
(Dry Soil)
Vegetation Impeding
movement.
Hydrology (rivers)
Figure 4-6. Obstacles with dry soil.
The combined obstacles overlay usually reveals one or more MC. Since
regiments normally advance along separate MCS, each division AA should
contain regimental MCS. The start point of an attack begins at enemy
assembly areas and terminates at their objective.
A convenient technique for identifying AAs is to place a doctrinal
template over a potential AA and visualize the enemy force moving through.
Ask: Is there sufficient maneuver space? How does the enemy look while
approaching critical points on the battlefield, such as the FEBA? How
does the enemy look when considering attrition? An enemy force fighting
through a covering force takes losses. To the attrition add the fact that
the enemy has a narrower front when attempting a breakthrough. The
analyst uses this information to depict a more realistic AA. When
briefing on the AAs, the S2 or analyst must “talk” the commander through a
visualization of the enemy force fighting along the AA. Figure 4-10 shows
what the commander needs to see.
4-14
The analyst moves the template along the avenue from projected enemy
assembly areas to the objective. An AA is never completely free of
obstacles, but it provides for relatively free movament. Obstacles
generally parallel the direction of movement.
The analyst selects alternative AAs. If they partially overlap, the
analyst should not be concerned. The most direct route to the objective
normally is a viable option.
LINE OF SIGHT ANALYSIS
In terrain and weather analysis, the terrain team determines LOS for
weapons, communications, TA, intelligence collection, and R&S systems.
Direct fire weapon systems like the antitank guided missile (ATGM), the
self-propel led antiaircraft gun, and the tank need good FofF to
successfully engage the enemy forces at maximum range. fm radio
communications, forward observers, TA and surveillance radar systems, and
SIGINT need optical or electronic LOS to the target. Terrain and weather
factor overlays assist in analyzing LOS limitations. LOS analysis helps
determine where ground forces can best shoot and communicate and the most
likely low altitude air approaches into the AO. In LOS analysis, the
analyst considers the following factors:
"Terrain elevation.
4-15
IF YOU ARE AT
AVENUES OF APPROACH
MOBILITY CORRIDORS
DIVISION
RECEIVE ARMY AA FROM PARENT
CORPS
DEVELOP DIV AA FOR SUBORDINATE
BDE
RECEIVE REGT MC FROM
PARENT CORPS
DEVELOP BN MC FOR
SUBORDINATE BDE
BRIGADE
RECEIVE DIV AA FROM PARENT
DIV
DEVELOP REGT AA FOR SUBORDINATE
BNS
RECEIVE BN MC FROM
DIV
DEVELOP CO MC FOR
SUBORDINATE BN
BATTALION
RECEIVE REGT AA FROM PARENT
BDE
RECEIVE CO MC FROM
BDE
DEVELOP PLT MC
Figure 4-9. Avenues of approach and" mobility corridors matrix.
"Tree and vegetat ion he ight above elevat ion.
0 Height of built-up areas.
“Density of ground vegetation at full growth.
“Terrain factors, such as defiles, which are not apparent because
of contour spacing.
4-16
"Effects of weather, such as fog or precipitation that obscure
observation.
The effects of seasonal changes on LOS should be readily apparent.
Winter vegetation compared to summer full growth alters LOS significantly.
The limitations of the standard military map is overcome through imagery
analysis (1A) and ground reconnaissance. Imagery analysts and terrain
specialists are trained in LOS analysis.
Direct fire weapons systems require horizontal or ground LOS. As a
rule, 4,000 meters (m) is considered the maximum range for unaided direct
fire weapons. Horizontal LOS overlays also depict friendly LOS.
Figure 4-10. Selecting avenues of approach.
4-17
Figure 4-11 is a horizontal LOS overlay depicting FofF. Areas of maximum
LOS are color-coded to aid analysis. Other range parameters are colored
for easy identification. Heavily forested areas would not necessarily
obscure LOS. Depending on the density of vegetation, LOS might penetrate
100 m or might penetrate 100 m or more of the forest. The height of
ground vegetation and the seasonal density (taller than 1 m) might degrade
LOS. This illustrates why an analyst must know the terrain of each
battlefield system that is being analyzed.
While ground-based systems need horizontal LOS, airborne systems use
oblique or vertical LOS. An attack helicopter armed with machine guns and
rockets rel ies on LOS from the aircraft to the target. Standoff weapon
systems that pop up from behind masking terrain require accurate LOS and
positioning data. Airborne R&S systems, such as the side-looking airborne
radar (SLAR), have similar needs for LOS data. Analysis of vertical and
oblique LOS from an enemy AD and target perspective helps identify the
best air avenues of approach (AAAs) into enemy airspace.
Determining how terrain and weather conditions along each AA affects
radio and other means of field communications is probably the area least
considered by most analysts because of their general lack of knowledge of
communications systems. The corps or division signal officer assists in
determining the advantages and limitations of each AA to enemy
communications systems. The SIGINT analyst also assists in this effort.
Most AAs do not offer unlimited options for the employment of
communications and noncommunications systems. The intelligence analyst
prepares a communication-noncommunication overlay of potential sites for
4-18
each MC. Having done this, the analyst compares each and makes some
initial determinations as to which is most favorable. |_qs information
also is essential to electronic deception since this operation requires
knowledge of where friendly signatures are observed. Figure 4-12 shows
terrain masking and horizontal LOS.
Figure 4-12. Horizontal line of sight.
4-19
AVENUES OF APPROACH ANALYSIS
In AA analysis, the intelligence analyst selects the AAs and AAAs that
best support the capabilities to move, shoot, and communicate. The
analyst considers each avenue in relation to each friendly or enemy
capability, and then lists and compares the advantages and disadvantages
of each. This is not merely a matter of counting advantages and
disadvantages, but requires detai lad analysis and sound judgment.
This analysis is not to determine which AAs the enemy selects, but
rather to determine which best supports the capability to move, shoot, and
communicate. Figure 4-13 shows how an analyst depicts AAs on an overlay.
Once the most viable AAs are selected, the analyst prepares an overlay
depicting each AA and MC. MCS are subsets of AAs and both are shown
together. When weather is a consideration, the analyst prepares an
overlay for each season.
4-20
APPLICATION OF WEATHER FACTORS OVERLAYS TO ANALYSIS
Similar to terrain analysis, the G2 or S2 produces graphic weather
overlays to help facilitate analysis of weather effects on friendly and
enemy battlefield operations.
The analyst prioritizes which military effects of weather generally
have the greatest impact on the unit and threat force. Time does not
al low the analyst to cover all aspects nor to depend solely on the weather
teams. Prioritizing becomes critical when operating at battalion or
brigade level because there is little time available.
The analyst focuses on each weather factor, examining its effects
separately for both friendly and enemy forces. Using weather factor
analysis, the analyst identifies specific vulnerabii ities and significant
benefits which contribute to the command’s successful accomplishment of
the mission.
The analyst should not generalize weather effects. The analyst should
seek details which are useful . The best way to be successful at this is
to track weather effects on unit operations during training exercises,
catalog these for future reference, and discuss with subordinate
commanders what critical weather effects are needed to operate
successfully. By doing this, the weather analysis supports operations and
the ana! ystt maximizes what little time exists for other IPB requirements.
WEATHER ANALYSIS
Analyzing the cl imate and weather in the AO helps to determine their
effects on friendly and enemy operations. Terrain and weather analysis
are insepa-able, because the tactical environment requires that climate,
weather, and terrain information be considered concurrently. The products
of weather analysis are applied in terrain and threat integration.
Weather has a significant impact on both friendly and enemy
operations. The weather is analyzed in detail to determine how it affects
both friendly and enemy capabilities to move, shoot, and commnunicate. A
detailed discussion of weather analysis is found in Chapter 4, FM 34-130.
Weather factor overlays are integrated with the terrain overlays to
predict the battlefield araas where friendly and enemy forces can
maneuver.
The weather team analyzes climatic data to determine the
characteristics of weather in the AO. The terrain team analyzes the
effect of weather on tactical operations and, together, the teams
integrate weather data and overlays with the terrain analysis and
overlays.
The weather analysis team prepares a matrix to define the required
analysis and specific weather requirements and determine which overlays
are required to support the operation. The matrix isolates militarily
significant weather factors and provides the capabi I ity to correlate
4-21
weather effects with specific combat operations. Examples of weather
subfactor overlays produced by the weather analysis team include fog,
cloud coverage (summer or winter), rain and snow, and weather effects on
slopes. The overlays, along with the combined obstacle overlay, identify
where forces maneuver on the battlefield.
At brigade and battalion level the S2 requests those IPB products
which address weather effects for their AO from higher headquarters.
Commanders and staffs must understand and consider weather factors in
tactical planning. They must recognize the tactical significance of
weather effects and the risks or opportunities they present. While
considering the effect of weather on all aspects of a mission, the S2
concentrates on weather impact on mobility and LOS. The effects of
weather are integrated with the enemy and terrain through IPB; this
integration is described in FM 34-81 and FM 34-130. A detailed
description of weather effects is in the Weather Effects and Information
Handbook (Draft) July 88, USAICS.
Low visibility is beneficial to offensive and retrograde operations
and detrimental to defensive operations. In the offense, it conceals the
concentration and maneuver of friendly forces, enhancing the possibility
of achieving surprise. Low visibility hinders the defense because
cohesion and control are difficult to achieve, R&S are impeded, and TA is
less accurate. These disadvantages are offset partially by extensive use
of illuminants, radar, sound detection, and IR devices. In some
instances, using smoke and obscurant aerosols locally reduces visibility.
When examining effects of visibility keep in mind friendly and enemy
capabilities.
In all operations, restricted visibility prevents or limits the use of
aerial systems. The analyst must explain how visibility affects aerial
systems.
Wind speed and direction, both on the surface and aloft, usually favor
the upwind force. Wind favors the use of either NBC or conventional
weapons by the upwind force. Wind of sufficient speed reduces the combat
effectiveness of the downwind force by blowing dust, smoke, sand, rain, or
snow on personnel and equipment. The upwind force has better visibility
and advances easier and faster. Strong winds limit airborne and aviation
operations.
Strong surface winds and gusts cause injury to personnel (especially
paratroopers in their descent), damage to materiel and structures, false
radar returns, and restrictions on visibility by blowing sand, dust, and
other materials. Generally, winds above 20 knots create such effects.
Smoke operations generally are ineffective at wind speeds greater than 7
knots, As the surface wind increases at low temperatures, either
naturally or enhanced by vehicle movement, windchill becomes a critical
consideration . The windchill factor adversely affects improperly clothed
personnel and impedes activity in unsheltered areas. Wind speed also
affects the d istance that sound travels. Winds are beneficial because
4-22
they improve trafficability by helping dry the soil. A windchill index is
available in FM 34-81.
The primary significance of precipitation is its effect on the state
of the ground, visibility, personnel effectiveness, and the functioning of
some equipment. Ground status affects trafficability; heavy rain makes
some unsurfaced roads and off-road areas impassible. Heavy rains make all
roads in low-lying areas impassible. Both rain and snow drastically
reduce personnel effectiveness by limiting visibility (causing discomfort,
increasing fatigue, and creating other physical and psychological
problems) and the persistence of chemical weapons thus creating NBC hot
spots . Precipitation also adversely degrades the quality of some supplies
in storage. Snow accumulation of one inch degrades trafficability and
reduces the effectiveness of mines. Generally, more than one inch (2.54
centimeters (cm)) per hour or 2 inches (5.08 cm) in 12 hours of
precipitation is considered critical for tactical operations. Snow fall
exceeding 2 inches (5.08 cm) in 12 hours, 6 inches (about 15 cm)
accumulated on the ground, or drifts of about 2 feet (.6 m) also have a
significant effect on operations requiring mobility.
The type and amount of CC, as well as the height of cloud bases and
tops, influence both friendly and enemy aviation operations. Extensive CC
reduces the effectiveness of air support. This effect becomes more
pronounced as CC increases, as cloud bases lower, and as conditions that
are frequently associated with clouds, such as icing, turbulence, and poor
visibility aloft increase. In relatively unstable air, clouds are
associated with strong vertical currents, turbulence, and restricted
visibility aloft. Generally, close air support (CAS) and aerial resupply
operations require a ceiling of 1,000 feet (305 m) or more.
Clouds affect ground operations by limiting illumination and
visibility, They also determine the types, intensities, and amounts of
precipitation. Clouds, since they trap incoming heat from the sun and
rising heat from the earth, tend to make temperatures near the earth more
homogeneous. Temperature and humidity both affect air density. Air
density decreases as the temperature or humidity increases; thus,
efficiency of aircraft propulsion reduces in areas of high temperature or
high humidity. Although temperature and humidity may not directly affect
a particular tactical operation, extremes reduce personnel and equipment
capabilities, and may necessitate a reduction of aircraft payloads.
Tactics that are effective in one climatic zone may be ineffective if
used in another. The high temperatures and humidity found in the tropics
are conducive to the growth of dense fol iage, which drastically affects
operations. In arctic climates, cold weather periods--
0 Create an almost constant need for heated shelters.
0 Cause difficulty in constructing fortifications.
0 Increase the dependence on logistic support.
0 Necessitate special clothing, equipment, and combat skills.
4-23
A combination of temperature and wind speed produces a windchill
factor . A windchill factor of -26°F (-32°C) is considered the
critical value for personnel and equipment operating in cold weather, The
opposite extreme, 120°F (49°C), is considered the critical value for
personnel and equipment operating in hot weather, Similar restrictions
occur in the desert where temperature difference of over 50°F (IO°C)
occur between night and day in shelters without air conditioning or
heaters.
At division and corps, updating the weather data base is continuous,
particularly during periods of increased tension or combat. During these
periods, the intelligence analyst compares current and forecasted weather
with historic patterns to determine deviations. Updates are forwarded to
subordinate commands.
The analyst uses the weather data base as the foundation for analyzing
the effects of weather on combat operations. This analysis begins with an
evaluation of the mission, threat, Al, and friendly capabilities. While
the analyst considers the effects of the weather on personnel and
equipment, the primary concern is with their impact on mobility and LOS.
WEATHER FACTOR ANALYSIS MATRIX DEVELOPMENT
The weather factor analysis matrix (see Chapter 4, FM 34-130) assists
the analyst in organizing the analysis task, defining Specific weather
requirements, and determining what weather factor overlays are required to
support mission planning. The matrix isolates those weather factors that
are militarily significant and correlates their effects with specific
combat operations and supporting functions.
THREAT EVALUATION
During the threat evaluation phase, the intelligence analyst examines
enemy forces utilizing the nine OB factors.
The objective for the intelligence analyst during this phase is to
determine enemy capabilties, vulnerabilities, and strengths. Also the
analyst determines how the enemy would operate doctrinally If not
restricted by terrain and weather. The G2 or S2 analyzes the enemy based
on known information maintained in the enemy OB file. Information gaps
identified are translated into Rlls and sent up the intelligence chain to
be answered. Maintaining a detailed enemy OB file is a continuous
process. The S2 section maintains one for each of the unit’s contingency
and normal operating areas. The intelligence analyst uses the enemy OB
together with current information and the mission to develop an HVT list.
The S2 and staff develop an HVT list by imagining how the enemy would
fight, relative to the friendly force mission. The S2’s or analyst’s goal
is to identify enemy assets an enemy commander would consider valuable or
critical for the accomplishment of the mission. In thinking through the
enemy plan an analyst considers how the friendly element’s mission and
intent affects the enemy mission.
4-24
For example, if an analyst is thinking through an enemy attack and
knows that the friendly force is in prepared positions with extensive
obstacles and barriers throughout the perimeter, it is a logical
assumption that the enemy commander will want substantial engineer support
to breach friendly obstacles. The enemy commander may not be aware of the
obstacles, yet engineer assets in fact are critical to the enemy battle
plan. Enemy engineer units therefore become HVTS. The G2 or S2 provides
this and other HVTS in the form of a HVT list to the G3 or S3 and the FSE
so target priorities are established and planned for.
By analyzing probable enemy actions, the analyst enhances the
probability of mission success by determining HVTS which can become enemy
vulnerabilities if acted on by the G3 or S3 and the FSE.
The analyst develops doctrinal templates during the threat evaluation
phase. Before creating doctrinal templates, the analyst determines which
enemy echelon is the focal point for analysis. US commanders are
interested in enemy echelons one level above their own because that is the
enemy echelon that directs a battle against them. Enemy maneuver elements
are templated for units two echelons below that of the US commander,
because those are the ground force units in direct contact with the unit.
Knowledge of enemy doctrine provides a starting point for doctrinal
templates. For example, doctrinal templates may be required to reflect
the sequential order of an enemy unit in the attack from its assembly area
to the ultimate objective. The sequence may be as follows:
"Tactical march formations.
° River crossing (hasty, deliberate)
"Breakthrough.
"Envelopment.
"Exploitation.
"Pursuit.
One method of determining which operations and units should be
templated is to develop a matrix. The matrix shows which types of
operations and units that are expected to be encountered and provides a
clear record of what has been determined. Figure 4-14 showa an operations
or unit matrix,
It is also important to prepare doctrinal templates of battlefield
functional systems. The functional system templates generally expand
information that is reflected in the primary doctrinal templates. For
example, a template depicting an enemy division in a river crossing is
expanded by a subset depicting the deployment of engineer bridging and
pontoon equipment.
Again, not every possible enemy action and subset is templated.
4-25
^ Types of Operations
Types of Units
Movement to
Contact
Meeting
Engagement
River
Crossing
Attack
Against a
Defending
Enemy
Pursuit
Motorized Rifle Division
X
X
■a
MM
X
Motorized Rifle Regiment
X
n
X
X
Motorized Rifle Battalion
X
X
X
Independent Tank Battalion
X
X
X
Tank Division
X
m
■a
X
X
Tank Regiment
X
X
X
X
X
Tank Battalion
X
X
Figure 4-14? Operations or unit" matrix.
A matrix is an easy way to lay out the information to be analyzed and
recorded, Using a matrix, the analyst looks for those battlefield
functional systems in certain types of operations that tell the most about
how the enemy operates in relation to the mission. Figure 4-15 shows the
types of operations on a battlefield functional systems matrix.
THREAT INTEGRATION
The objective of threat integration is to integrate enemy doctrine
with the terrain and weather analysis done in previous IPB phases. This
further reduces uncertainty as to how the enemy fights. Members of the
staff analyze potential courses of action during this phase to advise the
commander of the best course of action to accomplish the mission.
To assist the staff, the G2 or S2 produces situation, event, and
decision support templates. FM 34-130 provides a detailed description on
how to prepare these templates. This chapter discusses how the analyst
should apply these templates in order to support the staff planning
process.
SITUATION TEMPLATE
The situation template depicts how the enemy adjusts doctrine to
terrain and weather effects throughout the battlefield. Knowledge of
enemy doctrine is critical to developing and using situation templates for
analysis.
4-26
N. Types of Operations
Types of N.
Battlefield systems
Tactical
March
Formations
Meeting
Engagement
River
Crossing
Attack Against a
Defending Enemy
Pursuit
Tactical Rockets and Artillery
X
X
X
X
X
AD
X
X
X
X
X
Communications
X
X
X
X
REC
X
X
X
X
Missiles
X
X
Reconnaissance
X
X
X
Rear Services
X
X
X
C 3 of MRD
X
X
X
X
X
C 2 of MRR
X
X
X
X
X
Engineers
X
X
X
X
Figure 4-15. Battlefield functional systems matrix.
During this phase the analyst takes doctrinal templates and visualizes
where the enemy force will place assets on a particular point on the
ground. By doing this, MCS within each AA become apparent.
As enemy forces move along AAs and MCs, they do so sequentially. The
analyst follows the enemy by sequentially and situationally templating
their movement.
Because of time constraints, apply situation templating initially to
critical areas on the battlefield. These are based on the friendly force
mission and what the commander feels are critical battlefield points and
areas. By applying situation templates the analyst usually depicts
expected enemy movements along an AA for the commander and staff. This
contributes to the planning process by allowing the commander to get a
“visual feel” for the enemy’s plan.
PRIORITY INTELLIGENCE REQUIREMENTS
PIRs are the expression of the commander’s information needs. When
recommending PIRs, the intelligence analyst keeps in mind the commander’s
intent. The analyst limits the PIR to a few questions. These PIRs must
seek answers to questions critical to the successful accomplishment of the
unit's mission.
4-27
While PIRs are general in nature, they must be specific enough to
identify the critical information required. For example if the brigade is
preparing defensive positions in anticipation of an attack, then a PIR
could be: When will the enemy attack? A more specific PIR would be:
When will the enemy attack and where is the main effort? This PIR, if
answered, helps the commander prepare a more effective defense
particularly if time is short. Knowing where the main effort is helps the
commander prioritize defensive preparations.
EVENT TEMPLATE
Situation templating is the basis for event templating. Event
templating is the identification and analysis of significant battlefield
events which provide indicators of an enemy course of action. It is a
projection of what most likely will occur if the enemy adopts a particular
course of action. By knowing what the enemy can do and comparing it with
what the enemy is doing, it is possible to predict what the enemy will do
next. Because there are normally several courses of action which lead to
the enemy’s objective, each must be identified. Event templates are then
developed for each course of action. This is because the enemy course of
action which the analyst identifies as the most probable may not be
selected for reasons of deception or other factors known only to the
enemy. The analyst must be able to shift attention quickly between
courses of action during the battle.
The event template is a critical analytical tool for determining the
enemy’s posture and movement. Knowledge of when and where enemy activity
is likely to occur on the battlefield provides indicators of enemy
intentions. Indicators may be negative (that is, things that do not
happen may be just as critical as what does happen). The projection of
battlefield events occurs through situation development during the
prehostility or predeployment phase of the IPB process and is verified or
refuted during combat operations.
While visualizing the enemy force moving along an AA or MC, critical
areas become apparent. These areas are significant because they are where
significant events and activities should occur. If the analyst’s
hypothesis is correct, it is within these areas that targete appear. The
intelligence analyst designates these areas as named areas of interest
(NAIs) .
An NAI is a point or area, often along an identified MC, where enemy
activity (or inactivity) confirms or denies a particular enemy course of
action. NAIs also fall outside of a MC. For example, there may be
activity on key terrain, such as high ground, in support of movement on an
adjacent MC.
The event template and its NAIs are the basis for intelligence
collection, R&S, and analysis because they--
"Focus attention on areas where the enemy force must appear if it
uses a particular MC.
4-28
0 Frame militarily significant events by time and location within
an NAI.
0 Compare events in one NAI with events occurring in the NAI of
other MCs to determine enemy intentions.
It is important to develop event templates as quickly as possible.
Refine them further as time permits. Early preparation permits quick
development of an R&S plan. R&S assets are focused on NAIs to obtain the
greatest payoff in relation to limited assets. The primary goal of an
analysis is to apply the event template to the collection of information
which supports the mission planning effort.
EVENT ANALYSIS MATRIX
The event analysis matrix (EAM) supports the event template. It
correlates the expected events and activities within each NAI and adds the
dimension of time. Through analysis of enemy doctrinal movement rates and
the effects of the terrain and weather on their mobility, estimate the
time required for the enemy to move between NAIs.
The analyst prepares an EAM for the primary AA and each MC within it.
Figure 4-16 shows a sample EAM. Due to time limitations and staff size,
most EAMs are prepared at division level or higher.
Before combat, the EAM and event template illustrate possible enemy
courses of action as a basis for comparing friendly courses of action.
During combat operations, they focus on enemy probable courses of action.
Event templating enables the G2 to develop precise collection
requirements, maximizing the effectiveness of I imited resources over
extended areas against a vast array of enemy targets. It assists the
intelligence analyst in determining where to look, when to look, and what
to look for. Situation and event templates enable the collection manager
to establish collection priorities based on those courses of action the
enemy is most likely to adopt. Framing movers and emitters, the primary
indicators of events and activities, in time and location, allows the
collection manager to determine the optimum mix of collection sensors.
Event templating also serves the G3 by tell ing-
“Where and when to shoot, jam, and maneuver.
"What to shoot, jam, and maneuver against.
Event templating is the vital link between the success of the
commander’s tactical concept and intelligence requirements and the
collection, planning, and execution needed to fulfill those requirements.
DECISION SUPPORT TEMPLATE
The DST is a logical extension of event templating; it relates events
of the event template to the commander’s decision raquirements. The DST
4-29
is not the sole responsibility of the G2 or S2. Production of the DST and
synchronization matrix is a shared responsibility, involving the entire
staff or their representatives. The G2 or S2 provides information about
the enemy. The G3 or S3 guides the effort and ensures that it supports
the commander’s intent.
A properly prepared DST portrays the enemy’s most likely course of
action and possible target areas of interest (TAIs) along with time phase
lines (TPLs). It also depicts decision points (DPs) which relate to the
use of fire, maneuver, and CSS.
COORDINATES
AVENUE OF APPROACH II
FM: NB 606330-NB 650333
TO: NB 462181-NB 494132
MOBILITY CORRIDOR A
FM: NB 670300
TO: NB 468158
NAMED AREA
OF INTEREST
DISTANCE
(kms)
RATE OF
MOV (kph)
ESTIMATED
TIME
EVENT OR ACTIVITY
OBSERVED
TIME
NAI NO. 1
NB 649288
RD JUNCTION
A. RECON ELM
B. ADV GUARD
30 km
1.5 hrs
C.
NAI NO. 4A
NB 647264
CHOKE POINT
30 km
1.5 hrs
A. RECON ELM
B. ADV GUARD
C.
NAI NO. 4
NB 601222
RC JUNCTION
A. RECON ELM
9 km
30 min
B. ADV GUARD
C.
NAI NO. 3
NB 561220
BRIDGE
40 km
—
2 hrs
A. RECON ELM
B. ADV GUARD
C.
NAI NO. 7
NB 480180
RD JUNCTION
A.
B.
C.
Figure 4-16. Event analysis matrix.
4-30
Target Areas of Interest
Areas along each AA and MC where the comnander influences the enemy
through fire and maneuver are TAIs. The TAIs are normally areas which
were earl ier identified as NAI. They are areas where we delay, disrupt,
destroy, or manipulate the enemy force. They are also areas suitable for
attacking HVTS.
A TAI is an engagement area or point, usually along an MC, where the
interdiction of enemy forces by maneuver, fires, or jamming deprives or
reduces a particular enemy capability. It also may cause enemy forces to
abandon or require the use of unusual support to continue operations. In
the latter option, TAIs are terrain-dependent to inhibit or deny movement.
Sample TAIs include—
"Key bridges.
"Road junctions.
"Choke points.
”DZS and LZS.
"Known fording sites.
The TAIs are significant because they constitute a basis for
allocation of attack resources. The identification of TAIs is a joint
effort of the intelligence, operations, and FSE staffs. The intelligence
staff evaluates enemy forces and the effect of interdiction on their
capabilities. The operations staff and FSE consider the availability of
interdiction resources, the effects of interdiction on the accomplishment
of friendly missions, and priorities for the use of available resources.
Part of determining TAIs involves target value analysis (TVA). TVA is
a joint activity of intelligence, operations, and FSE personnel. Through
analysis of enemy doctrine, TVA names and provides the basis for locating
enemy elements which are key to the enemy’s success. These enemy elements
are known HVTS.
A second category of targets is the HPT. Destruction of an HPT is
advantageous to friendly operations. The commander designates the HPTs.
For example, suppose the enemy must cross a wide, deep river in a friendly
sector as part of a probable attack. Enemy engineer assets are very
important to the enemy commander’s success. The engineer units and
equipment are HVTs because without them the river crossing is impossible.
The friendly commander, briefed on this HVT, designates the enemy engineer
assets as HPTs because their destruction is of great value to the friendly
defense plan. This particular HPT is prioritized among other HPTs for
location by intelligence personnel and subsequent attack by lethal and
nonlethal means.
4-31
An analyst must have an in-depth knowledge of enemy doctrine to
determine potential HVTS, CPS, missile units, and logistics points on
situation and event templates. This knowledge helps in cueing collection
assets to possible HVT locations designated as TAI for the DST.
Decision Points
Following the selection of TAI, the analyst identifies DPs. The
availability and capability of friendly fire and maneuver systems largely
influence the location of DPs; therefore, their selection is primarily a
G3 or S3 function. However, this task requires the efforts of both the G3
or S3, the G2 or S2, and their respective staffs.
DPs identify those battlefield events which may require tactical
decisions and the no-later-than time when these decisions are made for the
commander to retain available options. Decisions are made early enough to
ensure implementation in time to achieve the desired effects; however,
they cannot be made until there are indications that particular
battlefield events will occur and their locations determined with a high
degree of confidence.
DPs associate projected enemy locations with specific points on the
battlefield. Comparing times required to implement decisions, enemy
movement rates, and distances determine DPs. For example, if it requires
two hours to implement a decision, it must be made while the enemy is at
least two hours from the TAI where the event will occur. These decisions
include more than fire and maneuver; they also include decisions such as
donning mission oriented protective posture (MOPP) gear, and employing
smoke. Enemy doctrinal movement rates that the analyst develops are
adjusted to compensate for the effects of the terrain, weather, and
friendly action on mobility. They provide the basis for computation.
The DST depicts the TAI and DPs. Figure 4-17 shows a sample offensive
DST with synchronization matrix.
Decision Support Matrix
A decision support matrix supplements the DST. This matrix relates
each DP to the event or associated TAI or NAI requiring a friendly
reaction. Decisions are made by the time enemy forces pass DPs or a set
of options which were available are negated. Other information from the
IPB data base, like enemy composition and probable deployment, supports
the DST.
Intelligence provides a basis for tactical planning and execution.
Detailed planning is accomplished during the static period, as an 8- to
10-day battlefield scenario does not allow time for detailed planning.
Event and decision support templates are the results of detailed
intelligence planning that is accomplished during static conditions. They
are the basis for all tactical planning. These templates are the filters
through which all information and intelligence are directed to the
commander. They are relevant to the commander’s needs, as expressed in
PIR and IR, because they are keyed to important battlefield events and
4-32
4-33
PIR-DEF POSN
PIR 2 ECH
C CO MAIN
ATK
CONSOL
CONTINUE
DP 2 AND 3
COMMIT
RESERVES
CASTAI 2,3
HPT-MBA
ARTY TAI 7
HPT— 2d ECH
DPI SMOKE TAI5
RED/TIGHT
YELLOW/FREE
YELLOW/FREE
time and space factors known to be of interest to the commander. The DST
is the vital link between the conmmander’s intelligence needs and the
resultant actions the commander and staff require.
The commander is vitally concerned with wresting the initiative from
the enemy commander; that is, forcing the enemy commander to choose a less
desirable course of action through design rather than chance. The DST
frames the commander’s opportunities and options and ensures timely and
accurate decisions. This provides the means to influence enemy actions
rather than just react to them.
INTELLIGENCE PREPARATION OF THE BATTLEFIELD DURING PEACETIME
This chapter has emphasized the vital role that IPB plays in preparing
for the next battle. During peacetime, IPB builds an extensive data base
for each potential area in which a unit is required to operate. It
analyzes this intelligence data base in detail to determine the impact of
the enemy, weather, and terrain on operations and presents this
information graphically. IPB is initiated any time the commander faces a
new enemy or receives a new mission. It is a continuous process which
supports planning and execution for all operations.
4-34
CHAPTER 5
ANALYSIS IN DEPTH
Analysts do not find intelligence. Analysts develop intelligence
through evaluating, assessing, integrating, and interpreting information.
This intelligence focuses on the commander’s needs. It must support the
commander’s decision to concentrate or disperse forces on the
battlefield. It must provide information to assist the commander in
targeting and defeating the enemy. This chapter addresses some of the
techniques and tools which the intelligence analyst uses to manage
intelligence production.
Analysts face daily problems. These challenges vary from the simple,
such as finding information, to the complex, such as predicting specific
enemy courses of action. The analyst makes decisions regarding what, how,
and when the commander can use information to support the battle. This
information often means the difference between winning and losing on the
battlefield, so it is vital that analysis be both accurate and timely.
This information and analysis influences decision making. Although the
analyst does not make decisions for the commander, the commander cannot
make qual ity decisions without’ the information that analysts provide.
MEETING USER REQUIREMENTS
The ultimate user of intelligence is the commander. The analyst
produces intelligence that the user specifically needs. Through stated
PIRs and IRs, the commander drives intelligence production and focuses
efforts. The commander’s IRs often pertain to varied areas on the
battlefield. For example, intelligence required to support the rear
battle is different from that required for the deep battle. Different
staff sections require different information, yet all of this supports the
commander’s needs on the battlefield.
It follows then, that to satisfy user requirements, the analyst must
understand what those needs are. Figure 5-1 lists some of the factors
which an analyst should consider in developing an intelligence product.
If the analyst and the user do not look at information or problems from
the same perspective, the intelligence will not support requirements.
As a simple example, suppose the user asks for a list of locations
where a river may be bridged. The analyst considers the enemy’s tanks,
which weigh about 40 tons, and provides such a list. If the user plans to
cross these bridges with American tanks, which weigh about 60 tons, the
list of locations is useless. Clearly, the analyst has failed to
understand the user’s needs.
In the tactical environment, the analyst and the user see the mission
as fighting the same enemy in a specific geographic area. From the
knowledge each has about the tactical situation, both develop conceptual
mode Is, The analyst and the user create some type of theoretical
5-1
ABOUT THE USER:
ABOUT THE PRODUCT:
• What does the user want to know?
• Is the product directly usable?
• What does the user already knpw?
• Is the most significant information
• What are the user’s areas of
up front?
uncertainty?
• Are the user’s areas of uncertainty
• What is the user’s time frame for the
addressed?
requested information?
• Is the product understandable or is
• What does the user need to know to
more information needed?
understand the product?
• Are the user’s requirements
• What is the user going to do with
addressed directly?
the product?
• Is there ariy nonessential informa-
• What is the last time a product was
tion in the product?
given to the user?
• Is the product adapted to the means
• How did the user react to the
of communication?
product?
• Is the product at the user’s needed
• How should the user react or not
level of description?
react to this product?
• Has the credibility of this product
• How will uncertainties affect the
been established?
user’s reaction to this product?
Figure 5-1. Developing an intelligence product.
representation of the tactical situation. These conceptual mode Is have
common factors wh ich both anal yst and user share. These common factors
are termed “a shared conceptual model .“
Without a shared conceptual model, the user and analyst cannot
communicate. Effective communication allows the analyst to understand the
user’s requirements and to tailor the product to them.
Communication allows analysts to interpret what the user wants and
fill in any missing intelligence pieces. This is easily done through
feedback.
Feedback greatly improves the quality of any intelligence product. If
user and analyst communicate during the development of a product, the
shared conceptual model is refined. This allows the analyst to orient on
those areas important to the user and to eliminate nonessentials.
Refinement of the “model”’ sensitizes the analyst to areas of uncertainty
and the criticality of time in a given situation. The analyst, in turn,
al lows the user to understand the risk inherent in any estimate and the
basis for assumptions made.
Face-to-face communication is the best form of feedback. It is also
the best way to develop a shared conceptual model. Ambiguous words or
ideas can be instantly clarified, pictures or sketches can be drawn, and
maps consulted, When face-to-face communication is not possible, the
analyst speaks with staff officers or other representatives of the user.
If a standard of performance has been established or is described in SOP,
the analyst uses this as a measure of current efforts.
5-2
DETERMINING THE RISK FACTOR
Uncertainty is what the job of intelligence is all about. To succeed,
the analyst handles uncertainty from a number of sources. While objective
ground truth is found in the laboratory, it is not part of analysis of the
battlefield. The analyst frequently deals with ambiguous or even
misleading information.
The analyst’s greatest concern is uncertainty, the commander’s is
risk. Good analysts translate uncertainty into risk. Figure 5-2 shows a
graph of risk functions to consider. Risk increases as enemy lethality
moves from low to high. When a range of uncertainty is added to the
estimate of lethality, the potential danger becomes even greater. The
degree of risk a commander will accept governs the amount of uncertainty
the analyst reports.
For example, under a very high level of uncertainty, the commander
faces between one and three enemy tank divisions. The analyst admits the
level of uncertainty involved, while collecting and processing information
to reduce the uncertainty. The level of uncertainty that the analyst
Figure 5-2. Translating uncertainty to risk.
5-3
accepts is driven by the degree of risk the commander accepts. The
commander is unable to properly plan for battle knowing only that friendly
forces face “between one and three enemy tank divisions”. The same
commander is not concerned about facing 10 or 12 enemy tank battal ions;
the commander employs the same plan regardless, in facing 10, 11, or 12
battalions. The analyst does not waste time reducing the level of
uncertainty beyond reporting “10 to 12 tank battalions" because the
commander is satisfied with the given degree of risk.
Risk is a voluntary exposure to danger, however unavoidable it might
be under the circumstances. In combat, there is always risk in not
preparing response to a potential enemy action whether or not that action
has a high possibility of execution. Risk increases in response to
potential danger and decreases when the enemy threat credibility goes
down.
Risk increases when—
“Enemy force lethality increases.
“Warning time decreases. (Crises occur when warning time is less
than the required preparation time; the worst-case situation is
when there is total surprise and no warning.)
“The number of enemy options increases. (If the enemy’s plans
are ambiguous, then friendly forces might not plan effective
responses to all of the enemy opt ions.)
“The number of friendly options decreases. (If fewer options are
available for countering the threat, there is a greater chance
that the available options will not work.)
“The enemy’s knowledge of the battlefield environment, including
friendly forces increases.
Risk decreases when—
“The enemy force lethal ity decreases.
“There is greater warning time.
“The enemy has fewer options.
“The number of friendly force options increases.
“The friendly force knowledge of the battlefield environment,
including enemy forces, increases. Knowing how the environment
affects combat operations allows the commander to exclude
unworkable courses of action and to gain maximum effectiveness
from others.
The analyst’s uncertainty plays a key role in the evaluation of the
enemy and the amount of risk accepted. Uncertainty may arise for many
5-4
reasons. First, there is uncertainty about the enemy’s intent: “What is
the enemy’s real objective? What are the various means of achieving this
objective?”’ Second, there is uncertainty in evaluating the capabilities
of the enemy force to achieve these objectives. Third, there is
uncertainty in other factors (lethal ity, warning time, enemy and friendly
options, and environmental conditions). Fourth, there is uncertainty that
the method of response will produce the desired outcome.
THE THREAT MODEL
The threat model is a portrayal of the enemy. It allows the analyst
to piece together information, identify information gaps, speculate and
predict, and do problem solving. Most importantly, the threat model
allows some of the risk in a given situation to be quantified. There will
always be inaccuracy in a model, and so there will always be uncertainty.
Still, based on the model, an analyst can look for changes in a real-worid
situation to identify patterns, trends, and activity levels. Creating
such a model requires a knowledge of—
"Physical objects such as weapons, vehicles, and radar.
"Organizational structures of enemy and friendly forces.
"Battlefield environment, including terrain, hydrology, and
weather.
Once developed the model is refined and maintained, or it will lose its
validity.
Threat models incorporate white elements (battlefie Id geography and
environment conditions) , red elements (the enemy force (or threat), and
blue elements (the friendly force). The three elements of white, red, and
blue form an organizational structure from which the analyst can mentally
picture the battlefield. Figure 5-3 illustrates elements of the threat
model.
Thinking white is understanding the elements of the environment as
they affect the battle. In threat modeling, development of the white
framework comes first. It is the white framework that anchors the threat
model to the real world. The white framework is made up of space and
time.
Developing the geographic framework of the battlefield is as simple as
plotting the battlefield on a map. The dimensions of the battlefield
encompass the unit’s AO and Al.
The map is a model of the real world. The topographic map contains a
wealth of information about the battlefield environment, including
descriptions of terrain, roads, and population centers. The highly
detailed military map contributes more information to the threat model.
Time in the threat model is a sequence of time-period snapshots (or
windows) within which events occur. The analyst compresses threat model
5-5
Figure 5-3. Elements of the threat model.
time to bring events closer together or expand it to make individual
events more distinguishable. Overlaying time windows helps in seeing
patterns of events or distinguishing changes. In the threat model snapshot
sequence, one of the snapshots represents the current time frame. A
sequence of snapshots al lows the analyst to fol low courses of action from
the current time frame to the eventual outcome of the battle. Each
snapshot represents an overlay of information on the battlefield
geography. Figure 5-4 shows this.
Thinking red is seeing the battle from the enemy’s viewpoint. The red
element of the threat model is anchored in the real world. Enemy forces
use the political and military policies of the foreign nations involved.
The enemy combat force is an extension of political policies that are the
source of the conflict that creates the battlefield situation.
Next, in threat model ing, plot the red element, including locations
and likages of the political, military, and combat organizations on the
battlefield. The highest echelon of enemy organization plotted depends on
the echelon of interest to the friendly force commander. For example, the
strategic-level threat model has all aspects of the civil ian and mil itary
5-6
Figure 5-4. Seeing the battlefield.
force structure, whereas a division-level threat model shows only the
locations of the red forces up to army level.
The organization of red elements follows some form of hierarchical
structure, connected by lines of communication (LOC). The LOC shows the
relationships between units for command, control, and coordination. The
LOC is overlaid on the geographic structure and relates to physical
communication paths like roads, transmission lines, or electromagnetic
transmission paths. Figure 5-5 shows the three techniques.
Thinking blue refers to seeing the battle from the friendly
commander’s point of view. The threat model takes on its full meaning
when the blue element is introduced along with white and red. The targets
of red threat are blue elements; the components of the friendly force are
blue elements.
5-7
Fill out the RED War Plan with three techniques:
1. Start with enemy doctrine to structure the war plan.
2. Exploit intelligence sources to fill in details.
3. Use analogies to fill in missing Information.
Figure 5-5. Red elements three techniques.
The most common failing of analysts is their inability to “think
blue”. Analysts become extremely knowledgeable about the enemy, knowing
nearly exact numbers of equipment, biographies of commanders, and unit
histories, but they cannot see how friendly forces operate. It does
little good to understand enemy aviation without understanding some of the
characteristics of friendly air defense. While there are staff officers
who are experts in friendly systems and tactics, the analyst must still
have a familiarity with blue doctrine and tactics. This returns to the
need for a shared conceptual model.
In plotting the location of units in the white framework, the analyst
is concerned with the location of those combat units that information from
the threat model supports. Figure 5-6 lists some information sources for
developing the blue element of the threat model.
• Operations plan for the friendly force. • Friendly force doctrine.
• Mission plans. • RED view of friendly forces.
• Situation reports from operational elements. • Mirror imaging.
Figure 5-5. Information sources for developing the blue element.
Figures 5-7, 5-8, and 5-9 show checkl ists of white, red, and blue
questions that are asked when creating the threat model.
5-8
What is the geography of the battlefield?
What is the culture of the country area?
What is the history of conflicts in this region?
What is the attitude of the local population toward the enemy force? toward the friendly force?
What is the academic, economic, and technological level of the local population?
How is the local population armed?
How is the population distributed in the region?
What local cultural features (airfields, railways) can be exploited for military purposes?
How predictable is the weather in the area?
How does the weather affect operations, personnel, trafflcability, equipment, and communications?
During what time frame will hostilities occur?
How much time is available for preparation?
Figure 5-7. Checklist of white questions.
What is the enemy’s doctrfne?
What are the enemy’s tactics?
How does the enemy prepare war plans?
How does the enemy train?
What are the enemy’s objectives?
How is the enemy equipped?
What is the enemy’s strategy?
How is the enemy force sustained?
What are the enemy’s operational plans?
What are the enemy’s courses of actions?
How is the enemy force structured?
Figure 5-8. Checklist of red questions.
5-9
What are the BLUE principle* of war?
What are the friendly objectives?
What are the friendly force resource*?
What is the commander’s mission?
What resources does the have at his disposal?
What are the priority information needs of the commander?
What are the information needs to execute the mission?
Figure 5-9. Checklist of blue questions.
Given a model of how the battlefield should appear in a certain
situation, the analyst develops and tests hypotheses of how the enemy may
act. An hypothesis is an explanation that accounts for a set of facts and
that can be tested by further investigation. It is a set of logically
related propositions and an outcome. An hypothesis can be proven false
based on evidence, but it can never be proven correct in advance. The
best that the analyst can do is rank order several hypotheses or assign
rough probabilities to them, Whan seeking evidence to support or reject a
hypothesis there are several considerations for the analyst:
0 The enemy can be engaged in deception. The course of action
selected by the enemy does not have to be the best, but only
adequate. Deception efforts then can be mounted which support
the most obvious course of action.
0 Sensors can collect only in the areas where they look. If
targeted at one specific area, they may not collect information
in another. This information not collected may have confirmed or
denied a particular course of action.
0 Indicators may be redundant to several hypotheses,
0 Several sensors may collect the same piece of information. This
can give undue weight to a hypothesis.
0 Some small indicator may be vital to a certain course of action.
Large scale river crossings, for example, require engineer support.
If that support is conclusively absent, a river crossing cannot
occur, no matter what else supports that hypothesis.
0 The evidence gathered in one area may not be representative of the
whole battlefield. For example, the enemy has 15 battalions of
artillery available. Sensors report 4 battalions in the north and 2
in the south. This does not conclusively indicate a total of 10
battalions in the north and 5 in the south. The true disposition
may be 4 in the north and 11 well camouflaged battalions in the
south .
5-1 o
When selecting an hypothesis as “most likely” or rejecting it out of
hand, all of the above issues come into play. These errors in thinking
may lead to false alarms or rejecting perfectly good ideas. Other errors
also exist which affect analysis. They are called biases.
£J ASES
If a single term best describes the factors that interfere with
successful analytic thinking, it is bias. A bias is a subjective
viewpoint. It indicates a preconceived notion about something or someone.
Analysts must recognize biases and be aware of the potential influence
they can have on judgment.
Biases can have a positive influence on analysis. With a iack of
information, a preconceived notion gives a starting point for thinking
about a situation. However, biases are generally bad because they obscure
the true nature of the information. The analyst must recognize several
categories of biases so as not to be misled or drawn into the wrong
conclusions during the analysis process. Biases are cultural,
organizational , personal, and cognitive (perception).
CULTURAL BIASES
Cultural biases begin forming at an early age and continue throughout
a lifetime. They interfere with the ability to think in the same manner
as the enemy (think red). Analysts need considerable background
information on culture and social mores to perceive a situation In the
same way the enemy perceives it. If analysts do not have this experience
or information and decide to depend upon their own values when looking at
a situation, the analysis is likely to be wrong. The reason for this is
that different cultures tend to view similar situations differently.
ORGANIZATIONAL BIASES
Most organizations have specific policy goals. Any analysis done
within these organizations may not be as objective as the same type of
analysis done outside the organization. Some of the problems that occur
from a subjective internal analysis range from an unconscious altering of
judgment because of exposure to selective information and common
viewpoints held among individuals, to deliberately altering a judgment to
provide what the commander wants to hear. “Best case” analysis is a good
example.
“Best case’” is where an analyst preeents the situation in the most
optimistic light so as not to anger the commander. This frequently
underestimates the enemy’s capability while overestimating friendly
capability.
PERSONAL BIASES
Personal biases come from past experiences. If a thought pattern
previously led to success, analysts may continue to follow this pattern.
5-11
Even if the situations have nothing in common, the tendency to follow the
methods that were successful in the past is very strong.
COGNITIVE BIASES
The all-source analyst evaluates information from a variety of sources
(including HUMINT, SIGINT, IMINT, and open sources). Each source has
strengths and weaknesses. The degree of reliability, completeness, and
consistency varies from source-to-source and even from message-to-message.
This variance often creates doubt about the reliability of some sources.
The cognitive biases that cause analysts the most problems are
vividness, absence of evidence, oversensitivity to consistency,
persistence of impressions based on discredited evidence, and
availability.
Vividness
Clear and concise information has a greater impact on thinking than
abstract and vague information. Even if the vague piece of information
has more value as evidence, the tendency is to disregard faster than you
would eliminate a clear piece of information.
Absence of Evidence
Lack of information is by far the most common problem, especially in a
tactical environment. This does not mean that analysts should be content
with the information on hand; they always want more. Analysts shouldn’t
hold back information because it is not conclusive. It rarely is.
Instead the analyst should--
"Realize that information sometimes is missing.
"Identify areas where information is lacking and consider
alternative hypotheses.
"Adapt and adjust judgments as more information comes in.
"Consider whether a lack of informs”t ion is normal in those areas
or whether the absence of information is itself an indicator.
Oversensit ivity to Consistency
Consistent evidence is a major factor for confidence in the analyst’s
judgment. On the one hand, consistent information is appropriate. On the
other hand, information may be consistent because it’s redundant, or it
may come from a small or biased sample. The analyst considers if the
evidence is representative of the total potentially available information.
If it is not, or if it is not known, then the confbence level is low,
regardless of the consistency. The analyst must be receptive to
information that comes in from other sources regardless of whether it
supports the hypothesis or not.
5-12
Persistence of Impressions Based on Discredited Evidence
Whenever the analyst receives evidence, there is a tendency to think
of things that explain the evidence. These connections create
impressions. Although the analyst discredits the evidence, the connection
remains, and so do the impressions. An example is a clandestine source
under hostile control. If the source has a record of passing accurate
information, the analyst tends to judge all information that is passed
according to previous accuracy. The analyst may doubt the validity of the
report claiming that the source is under hostile control or may
rational ize the inaccuracy in some other way. Either way, the evidence is
based on previous information and not on current indicators. This is one
way an enemy could launch a deception operation. This is important. An
analyst who “reasons away” information contrary to pet hypotheses does the
commander a disservice. Analysts must be professional and capable of
saying, “I was wrong,” before the situation is lost.
Availability
The ability to recall past events influences judgment concerning
future events. Since memory is more readily available, and is more
acceptable, it is easy to rely upon memory instead of seeking a proper
sample to pred ict events.
Overcoming bias is a vital step to proper analysis. Any of the above
biasas reduces the quality of analysis performed.
5-13
CHAPTER 6
SITUATION DEVELOPMENT
Situation development enables commanders to see and understand the
battlefield in sufficient time and detail to make sound tactical
decisions. It helps locate and identify enemy forces; determine their
strength, capabilities, and significant activities; and predict their
probable courses of action. Situation development helps the commander to
effectively employ available combat resources where and when the decisive
battles will be fought. Also, it helps prevent the commander from being
surprised.
This chapter describes the analysis phase of situation development.
It also describes how information is converted to intelligence to satisfy
the commander's PIR. Analysis in support of situation development
continues the IPB process and portrays significant aspects of the enemy,
weather, and terrain in support of the decision-making process. This
portrayal is baeed on the analysis of information from all sources that
previously has been recorded, cataloged, and evaluated in a manner to
facilitate effective analysis. This intelligence data base is
continuously updated to ensure the information in it is current and
accurate.
Automation increases the capability to manipulate large volumes of
information from many sources and assist in the analysis process.
However, analysis continues to be a human function. Information is
interpreted by an analyst who adds the element of judgment, which is
essential “to effective intelligence analysis.
History provides many examples of intelligence failures that are
directly attributable to faulty analysis by people. In some cases, the
indicators were present, but were either not recognized or were
misinterpreted due to the analyst’s preconceptions of the situation. In
others, the analysis was correct, but was not presented in such a way that
decision makers would accept it.
The primary product of intelligence analysis is the intelligence
estimate. The estimate provides the best possible answer to the
commander’s PIR that is available at the time. The estimate is dynamic,
constantly changing with the situation. Thus, analysis is conducted
continuously with the information available. The available information
almost always is incomplete. The analyst uses what is known about the
enemy, weather, and terrain from the IPB to estimate what is not known.
In addition, the analyst determines the enemy’s capabilities, which are
the basis for predicting probable courses of action.
ENEMY CAPABILITIES
Enemy capabilities are courses of action which the enemy can take to
influence the accomplishment of the friendly mission. They indicate--
“What the enemy can do.
6-1
“When the enemy can do it.
“Where the enemy can do it.
“In what strength the enemy can do it.
The PIR normally are about enemy capabilities. Estimates of enemy
capabilities and their probability of adoption impact significantly on the
friendly commander’s scheme of fire and maneuver for accomplishing the
mission. By integrating the enemy’s tactical doctrine, characteristics of
the AO, and time and space factors as developed through IPB, the analyst
estimates enemy capabilities with a reasonable degree of confidence.
Enemy actions that would have little effect on friendly operations, would
not benefit the enemy, or are not tactically feasible are not considered
enemy capabilities. For example, an enemy force normally disengages its
troops in an adjacent area to free these for commitment within our sector
or zone. However, in some circumstances, this is not a viable enemy
option. Therefore, in those circumstances this capability normally is not
considered as an option.
Generally, there are four tactical courses of action open to the enemy
in conventional operations: attack, defend, reinforce, or conduct a
retrograde movement. These are divided into a variety of more specific
courses of action. For example, an attack may be a penetration, an
envelopment, or other variations of an attack. A retrograde movement may
be a delaying action, a withdrawal, or a retirement.
Some enemy capabilities refer specifically to the support of combat
forces rather than the capabilities of the combat forces themselves.
Support capabilities include--
0 U s e of NBC weapons.
“EW.
Support capabilities always are considered, especially when enemy
implemental ion of them will significantly affect the accomplishment of the
friendly mission.
The analyst considers when the enemy can implement a capability. Time
is a critical factor in the Air Land Battle; the friendly commander relies
on time to defeat enemy first-echelon forces before follow-on echelon
forces are committed to the battle. The friendly commander needs an
accurate estimate of when enemy forces are employed to decide how to fight
the battle. The analyst considers the following factors in estimating
when an enemy force will be employed:
“Mobility capabilities.
“Disposition.
“Doctrinal rates of movement.
6-2
"Characteristics of the terrain, LOC, trafficability, and
obstacles.
"Time required for displacement, assembly, emplacement, and closing
on the battle area.
Integrating information on the enemy and the battlefield environment
determines where the enemy implements a capability. The enemy
composition, disposition, and weapons and equipment dictate how well the
enemy moves, shoots, and communicates--the activities vital to most enemy
courses of action. Analysis of existing and forecasted weather conditions
and military aspects of the terrain reveals how they affect enemy
capabilities in various parts of the AO. AAs and MCS determine where the
enemy moves on the ground. LZS and DZS determine where the enemy employs
airmobile, air assault, or airborne forces. Suitable beaches determine
where the enemy launches an amphibious assault. The location of suitable
assembly areas, firing positions, and targets determines where the enemy
launches NBC weapons. Also, the location of suitable defensive positions
determines where the enemy defends. Terrain factor overlays, which are
developed during IPB, identify specified aspects of the terrain. They
help the analyst determine where the enemy implements various
capabilities.
The strength
primarily on the
forces. Chapter
for computation.
in which an enemy implements a capability depends
composition, disposition, and strength of available
3 describes the 06 files which provide the necessary data
Appendix D describes how to compute enemy strength.
The IPB data base is the key in determining enemy capabilities.
Doctrinal and situation templates assist the analyst in estimating enemy
capabilities. The avent template and EAM help the analyst determine when
and where the enemy can implement a capability. Using the working SITMAP,
the analyst continuously monitors the enemy situation. The analyst
compares the working SITMAP with IPB templates and adjusts the
capabilities accordingly. The analyst also follows the friendly operation
to determine which enemy capabilities have the greatest effect on the
friendly operation.
ENEMY COURSES OF ACTION
The ultimate objective of intelligence analysis is to answer the PIR
with an acceptable degree of confidence. This normally involves a
determination of the enemy’s most likely courses of action and the
probability the enemy adopts those courses of action. Like capabilities,
the analyst determines the enemy's probable courses of action in terms of
what, when, where, and in what strength. The probable courses of action
provide the basis for predicting enemy intentions. By accurately
estimating the enemy’s intentions, the analyst provides the answers to
critical uncertainties which impact on the commander’s tactical decisions.
indicators are the basis for situation development. The analyst
integrates information from all sources to confirm indicators of enemy
6-3
activities. As indicators are detected and confirmed, PIRs are answered.
Appendix C lists common indicators.
WORKING SITUATION MAP
The working SITMAP is the basic analytical tool at all levels. I t
provides a graphic presentation of the battlefield for the analyst,
commander, and staff. The working SITMAP integrates significant
information from al I sources in a graphic representation that is easy to
comprehend. All intelligence records are used with the working SITMAP to
develop the enemy situation and intelligence estimate. The analyst posts
all practical information to the working SITMAP. Such information may
include strength, activity, or last known location. An “as of” time must
always accompany map information. This allows outdated intelligence to be
removed and assists in monitoring enemy progress. The analyst maintains
separate records of information that cannot be posted and uses them to
back up and expand the information on the working SITMAP. Other records
normally are more permanent than the working SITMAP. The significant
information about the enemy and the terrain becomes apparent when posted.
The analyst uses the working SITMAP to—
0 Identify critical relationships.
0 Evaluate, compare, and integrate information and intelligence from
all sources.
0 Track enemy forces.
0 Identify indicators.
0 Wargame opposing courses of action.
0 Identify uncertainties.
Critical relationships help to determine the composition of enemy
units, assess their capabilities and probable courses of action, and
identify exploitable weaknesses. The analyst identifies critical
relationships by comparing separate items of information on the working
SITMAP and by comparing the working SITMAP with other intelligence
records.
By comparing known information about an enemy unit (posted on the
working SITMAP) with the appropriate doctrinal template and the OB book,
the analyst identifies unknown elements of an enemy unit. For example, if
two motorized rifle battal ions (MRBs) of an MRR have been identified,
located, and posted on the working SITMAP, the third MRB is most likely
deployed nearby. The doctrinal template helps the analyst determine the
most likely location of the third MRB. This comparison also helps the
analyst identify and locate enemy HVTS I ike CPS and AD weapon sites.
Figure 6-1 shows an example of a doctrinal template. Critical
relationships become more apparent when the doctrinal templates are
compared with known unit locations plotted on the working SITMAP. Further
doctrinal templates of Soviet-style forces are available in GTA 30-1-24.
6-4
|--- 7.5km---1
REGARDLESS OF OPERATIONAL FRONTAGE
NOTE: For clarity, support units and observation posts are not depicted.
Figure 6-1. Doctrinal template tank regiment main attack (div slice).
6-5
The working SITMAP makes it easier to evaluate and compare information
from different sources. The analyst compares incoming information with
the information previously posted to the working SITMAP for compatibility
with existing data. This comparison also helps to integrate new
information with existing information and to determine its significance .
The working SITMAP provides a record of the latest location of enemy
forces. As new information on enemy locations is received, the analyst
compares it with information on the old location. This indicates the
direction and rate of enemy movement. It also helps determine the
accuracy of reports. For example, if the time a unit is observed in a new
location (compared with the location and time the unit was last observed)
indicates unusually rapid movement that significantly exceeds the
doctrinal rates, the analyst is alerted to a problem. Either the old or
the new report is inaccurate, or the two reports may not concern the same
unit. It might alert the analyst to the possibility of an enemy deception
operation. The analyst uses the IPB event template and EAM to project
enemy movement. By comparing these with actual enemy movement as
indicated on the working SITMAP, the analyst predicts the enemy’s probable
course of action and predicts when and where the enemy implements it.
The working SITMAP is vital in recognizing and evaluating indicators.
Most indicators are associated with patterns of enemy activity, which
become apparent on the working SITMAP. For example, an indicator of
attack is the massing of artillery well forward. The working SITMAP
reveals the location, density, and movement of enemy artillery. A careful
analysis of the working SITMAP helps the analyst identify artillery
groups, their composition, disposition, and location in relation to the
FLOT. By comparing the working SITMAP with doctrinal and situation
templates, the analyst better identifies significant patterns of enemy
activity and associates them with specific indicators.
The working SITMAP is well-suited for wargaming opposing courses of
action. Wargaming integrates friendly and enemy capabilities and possible
courses of action with the weather and terrain. It helps both the
operations and the intelligence staffs to analyze opposing courses of
action. This is vital to preparing the estimate of the situation and the
intelligence estimate. It also helps the analyst predict the enemy
reaction to friendly courses of action.
The analyst uses the working SITMAP to clarify uncertainties. For
example, if the analyst identifies two MRBs that are subordinate to a
particular MRR, further knowledge of the enemy’s organization tells the
analyst that there is a third MRB that has not been located.
The IPB templates are important analytical tools when used with the
working SITMAP. Comparison of templates and the working SITMAP
systematizes analysis and increases the accuracy of the estimate.
Situation and event templates depict projected enemy activities while the
working SITMAP depicts the actual observed enemy activities. By comparing
and integrating the two, the analyst predicts future enemy activities with
greater accuracy.
6-6
FACTORS OF ANALYSIS
The analyst must understand the dynamics of the AirLand Battle to
accurately analyze the forces that occupy it and the impact of the
environment on those forces.
The analyst understands the enemy’s tactical doctrine and the other
forces that impact on the execution of that doctrine. The following
suggestions are some techniques for developing enemy capabilities and the
relative probability of their adoption. These techniques help the analyst
use available information effectively to find the right answers to
critical uncertainties.
The analyst considers the enemy’s use of mass and economy of force.
The enemy commander, like the friendly commander, has limited combat
resources. The enemy commander uses mass and economy of force at the
optimum times and places to accomplish the mission. Rather than dissipate
the forces across the entire battlefield, the enemy commander weights the
main effort to ensure combat superiority at the decisive time and place.
Once the analyst determines how the enemy commander uses mass and economy
of force on the battlefield, the enemy’s most probable course of action
becomes more apparent. The enemy uses follow-on echelons to mass combat
power at decisive times and places on the battlefield. In the AirLand
Battle, the analyst locates and tracks these enemy follow-on echelons and
predicts where and when they will be committed. Situation and event
templates used with the working SITMAP help the analyst predict where the
enemy will mass.
On a nuclear battlefield, massing presents new opportunities and
dangers. Nuclear weapons are substituted for massing of other forms of
combat power, yet some concentration of enemy forces is required to
successfully exploit strikes.
Analysts identify the composition of enemy force at least one echelon
above their own. The mass and economy of force problem is resolved at
each enemy echelon. The higher echelon commander’s decision on a maneuver
scheme and the allocation of combat power and support impacts directly on
enemy capabilities within the analyst's unit’s zone or sector.
Identifying the enemy composition facilitates construction of a
composite picture of the total enemy force structure, including
information on identified and unidentified units, located and unlocated
units, total reinforcements, types and amounts of CS or CSS, and the
availability of special capabilities (river crossing, EW, intelligence
collection). In addition, detailed analysis of enemy composition assists
in quantifying the degree of uncertainty that still exists. This judgment
affects the degree of confidence an analyst has in estimating. Most
intelligence judgments are inductive generalizations based on fragmentary
evidence. By comparing available information with the composition and
organization of the enemy force, the analyst determines what percentage of
the total picture of the enemy force is known, and what percentage remains
uncertain. For example, agencies report that four enemy artillery
batteries have displaced forward. The analyst generalizes that enemy
6-7
artillery is displacing forward, an indicator of attack. However, if the
composition of the enemy force indicates a total of 40 available
batteries, the analyst must recognize that the judgment is based on only
10 percent of the picture. Ninety percent is still uncertain. It is
vital that analysts be conscious of the degree of uncertainty remaining in
the situation.
Analyze the significance of enemy activity outside your zone or
sector . Consider the big picture when assessing the meaning and
significance of enemy activity in your AO. Enemy boundaries are not
identical to friendly boundaries. Events outside your boundaries may be
part of the enemy commander’s scheme of maneuver. Analysis of events
outside a unit’s AO provides indicators or helps focus the collection and
analysis efforts within that unit’s AO. Events that occur within a
friendly unit’s AO require correlation with events outside the AO if they
are to be correctly interpreted. This is related to and facilitated by
the determined composition of the opposing enemy force.
Review enemy tactical doctrine. Enemy commanders are trained to
follow their own tactical doctrine. Though some enemy commanders are more
or less innovative, most consciously or unconsciously apply doctrine when
confronted with a specific mission, threat, and AO.
Enemy tactical doctrine presents many of the indicators of enemy
capabilities and probable courses of action. It relates directly to how
the enemy uses mass and economy of force in operations.
The enemy’s tactical doctrine is depicted on doctrinal templates when
possible. Doctrinal templates depict unit formations; frontages and
depths for attack, defense, and other operations; characteristic
dispositions associated with particular courses of action; allocations of
CS and CSS; and information on specialized military operations like river
crossings and air assault operations. Event templates depict the
doctrinal sequence in which the enemy conducts operations. The IPB
templates and the working SITMAP are the basis for comparing the enemy’s
tactical doctrine with actual events.
Consider how the weather and terrain affect enemy capabilities and the
enemy commander’s choice of a course of action. Weather and terrain are
physical constraints which facilitate or alleviate the adoption of
specific courses of action. These constraints have a major impact on how
the enemy commander allocates resources. Weather and terrain force enemy
commanders to apply special methods of operations. They may require
changes in weapons and equipment or in the way they are used. The weather
and terrain may give rise to new force structures and organizations.
Paragraph two of the intelligence estimate addresses the effects of
the weather and terrain on friendly and enemy operations (see Appendix A).
Through continuous IPB and analysis, the analyst relates the enemy force
structure and tactical doctrine to the constraints imposed by the weather
and terrain, particularly on the AAs.
6-8
To relate enemy dispositions and physical constraints of the weather
and terrain, there are four specific techniques used to determine how the
enemy appl ies mass and economy of force.
The first technique is to determine the enemy unit boundaries and
relate them to AAs. Boundaries frequently are identified through the
location of enemy reconnaissance and cavalry units (which often have
distinctive, easily identified equipment), terrain and doctrinal analysis
of enemy prisoner of war (EPW) capture locations, and other techniques.
This technique helps determine mass and economy of force and the enemy
commander’s perceptions of AAs.
The second technique is to compute enemy strength in terms of
committed forces, reinforcements, and supporting weapons for the entire
AO, then recompute for each AA. Determine whether enemy combat power and
support are distributed evenly or whether one option is weighted.
Appendix D describes how to compute enemy strength.
The third technique is to analyze enemy allocations of available LOC.
Military forces usually allocate roads to tactical units for logistical
support and tactical movement. If this allocation is determined through
analysis of enemy boundaries and traffic patterns, it indicates the
enemy’s probable course of action and assists in identifying enemy support
priorities.
The final technique is to identify potential enemy objectives and
relate them to enemy dispositions and AAs. Determine which avenue is
weighted by locating unit boundaries, computing unit strength, identifying
allocation of LOC, and identifying the distribution of combat power.
TECHNIQUES OF ANALYSIS
The following techn iques of analysis helps the anal yst identify the
presence of indicators.
PATTERN ANALYSIS
Pattern analysis helps the analyst identify indicators of enemy
activity. Pattern analysis is based on the premise that the enemy’s
course of action results in certain characteristic patterns that are
identified and correctly interpreted. Ideally, paragraph 3d of the
intelligence estimate (Appendix A) should identify the presence of these
indicators. The analyst is faced with the problem of organizing and
recording incoming information and adding it to existing information so
that meaningful relationships are clarified. The working SITMAP and IPB
templates are the primary tools used to organize information. Indicators
can be ambiguous and incomplete. The analyst identifies the patterns of
activity or tip-offs which characterize the operations of specific enemy
units.
6-9
WEIGHTING INDICATORS
Weighting indicators helps resolve ambiguity. In combat, intelligence
analysts usually are confronted with conflicting indicators. Enemy forces
may portray patterns associated with attack, defense, and delay
simultaneously. Conflicting indicators result from--
0 Deliberate deception.
0 Bad execution.
0 Temporary indecis ion.
0 Transition between missions.
0 Random activity.
0 Incomplete or inaccurate information.
0 Ambiguity of the indicator itself.
When confronted with ambiguous or conflicting indicators, analysts
weigh some indicators more heavily than others to determine the enemy’s
actual intent. This is not a problem of simple mathematics. The enemy’s
actual course of action may not have the most indicators. Analysts
develop a methodology for identifying those indicators which are most
highly characteristic of a course of action. There are several techniques
which, individually or in combination, assist in this process.
Origin of the Indicator
One technique of determining the enemy’s intent is to consider the
origin of the indicator; that is, the reason why the enemy force presents
a particular pattern or tip-off. In brief, al I indicators stem from
either military logic, doctrinal training, organizational constraints,
bureaucratic constraints, or the personal ity of the enemy commander.
Military Logic . Mi I itary logic implies, and military experts agree, that
solutions to many m i litary problems are obvious. For example, all modern
armies employ artil lery forward for attack and echeloned in-depth for
defense. Violation of military logic usually implies the loss of combat
power or support at some critical point during an operation.
Doctrinal Training . A nation’s tactical doctrine includes military logic
and much more. Most doctrine begins where military logic ends. Military
experts sometimes disagree on the ideal solution to a specific military
problem. For example, US and Soviet doctrine agree on deploying artillery
forward in the attack, while they disagree on using artillery in a direct
fire role. Just as terrain and weather are physical constraints on the
enemy’s adoption of a course of action, enemy doctrine and training are
mental constraints. Soviet emphasis on detailed, repetitive training is
designed to inbreed a sort of reflex action which enhances the value of
doctrinal indicators. Though individual commanders display more or less
6-10
imagination and creativity in its application, indicators based on
doctrine and training are generally reliable.
Organizational Constraints . Organizational structure represents a special
case of doctrine. The ideal composition of a division (size,
organization, weapons, and organic support) is debatable. The military
experts have resolved this issue in radically different ways.
Organization influences include a nation’s strategic commitments, economic
resources, geography, threat perceptions, historical experience,
alliances, personnel and equipment resources, and a myriad of other
factors. The tactical organization resulting from these factors causes
identifiable patterns to develop when employed. A US division generally
has three subordinate maneuver headquarters contrasted with four in a
Soviet division, and differences in the composition and structure of the
division base imposes distinct patterns concerning US and Soviet
operations.
Bureaucratic Constraints . Identifying bureaucratic constraints as a
source of indicators shows that military units are large organizations and
must establish routines and SOPS to function efficiently. This imposes
patterns in planning, execution, logistics support, and other activities,
though there are general similarities in routines and procedures of
comparable units, there are likely to be significant variations which can
be identified and exploited locally.
Personality of the Commander . The enemy commander is the final source of
indicators. Each commander has a unique history of personal training,
experience, success, failure, and idiosyncrasies. Many are creatures of
habit, prone to repeat what has worked in the past; others are creative
and innovative. All are captives of their experience to some degree. It
is the commander who must apply, and mix military logic, doctrine, and
organization to accomplish the mission. The commander’s personality is
one major source of deviation from established doctrinal norms, The
importance of personality is recognized in that biographic intelligence is
a major component of strategic intelligence. US tactical OB doctrine
classifies personality as a subcategory under miscellaneous factors.
In general, indicators are weighed, with the role of the commander
being considered a variable. In the case of a strong, innovative, or
eccentric commander (Patton or Rommel), personality is more important than
doctrine or training; while the personality of a methodical, traditional
commander ranks last.
Principle of Mass Indicators
Another technique is to weigh the indicators which reflect or are
based on the principle of mass. Military units normally conduct deception
operations with the same force constraints in which they accomplish their
actual mission. The enemy commander often conducts deception with the
least outlay of scarce resources. Indicators based on a major confirmed
commitment of combat resources are more likely to reflect the true
situation. In a nuclear environment, massing is not required to achieve a
favorable combat power ratio; thus, mass is not a reliable indicator.
6-11
Analysts identify the enemy’s capability to concentrate fires of potential
nuclear del ivery systems.
Other Indicators
The last technique is to weight those indicators which are most
difficult to fake.
Quantify Probable Relationship . Quantify the probable relationship
between the presence of specific indicators and the enemy’s adoption of a
particular course of action. If the enemy commander intends to adopt a
particular course of action, what is the probability that a specific
indicator is present? The answer is subjective, but it is based on the
analyst’s knowledge of and experience with the enemy, the analyst’s
professional judgment, and to some degree, the mathematical probability of
specific indicators associated with enemy courses of action.
Analyze the Time Sequence of Events . It takes time for an enemy force to
prepare, move, and execute an operation. Time, mass, and space
relationships are a major tool in exposing deception. Since deception is
often conducted with the least outlay of combat resources, close analysis
of information from different sources which report on the same location,
at the same time, or concerning the same enemy unit may reveal significant
discrepancies.
Assess the Enemy’s Combat Effectiveness . Such assessments are based on an
analysis of both tangible and intangible factors. Tangible factors
include personnel and equipment strength. Intangible factors include
morale, training, political reliability, and other factors. While combat
effectiveness bears directly on a unit’s capabilities and probable courses
of action, there is no scientific method of determining it. It requires
the analyst’s subjective judgment of the impact of both the tangible and
intangible factors.
WARGAMING FRIENDLY AND ENEMY CAPABILITIES
Consider the enemy G2’s perception of the friendly force. Though
enemy capabilities exist independently of their assessment of friendly
forces, the enemy’s choice of alternative courses of action does not.
Determine the enemy's perception of friendly capabilities through analysis
of the collection capabilities, known collection activities, and
inadvertent disclosures by friendly forces which might have been monitored
by enemy intelligence. Detailed analysis of potential disclosure enables
the analyst to partially reconstruct the enemy G2’s working SITMAP.
Mentally wargame advantages and disadvantages of identified enemy
capabilities from the enemy commander’s point of view. This is a valuable
analytical technique, but potentially dangerous if it becomes
mirror-imaging.
Avoid preconcert i ons. The analyst must remember that the objective is
not to prove a prior judgment. Experience suggests that preconceptions
are the analyst’s principal nemesis. Even if the techniques recontnended
6-12
above are creatively employed, there is a danger that the analyst who has
reached and expressed a preliminary judgment unconsciously begins to seek
and weigh evidence which confirms the initial estimate and dismisses or
passes over inconsistent or conflicting information. The analyst should
not be concerned about the answer, as long as it is the right answer. The
analyst reserves judgment, maintains objectivity, remains aware of
uncertainties, tolerates dissent, and constantly tests working theory
against available evidence. Where practical, the analyst considers
establishing a “devil’s advocate’ system to test, challenge, and think the
unthinkable.
6-13
CHAPTER 7
TARGET DEVELOPMENT
Targeting is the process of selecting targets and matching the
appropriate response to them taking into a count operationa I requiremen ts
and capabilities. An efficient, organized targeting effort is critical to
the success of AirLand Battle operations. A target is a geographical
area, complex, or installation planned for capture or destruction by
military forces. Attacking HPTs that are least affordable to lose, strips
the enemy of the initiative and forces the enemy to conform to friendly
battle plans.
Targeting has always been a complex effort. Large numbars of sensors
under the control of different agencies are closely coordinated to be
efficient and must rapidly report fleeting or dangerous targets. The wide
variety of attack means and munitions are compared to the particular
vulnerabilities of many different types of targets. Targeting is a
multidisciplined effort, requiring interaction between FS, intelligence,
EW, operations, and plans cells.
The object of targeting is to disrupt, delay, or limit those enemy
capabilities which could interfere with the achievement of friendly
objectives. Do not confuse disrupt, delay, and limit with suppress,
neutral ize, and destroy. The latter relate to the amount of damage
inflicted upon a target. Disrupt, delay, and limit apply to the effect
that the damage has upon the target as it pursues a course of action. A
further clarification of disrupt, delay, and limit is available in Annex A
to FM 6-20-10. The staff recommends how a target is engaged.
Targeting is based on the friendly scheme of maneuver and tactical
plans. It includes an assessment of the weather, terrain, and enemy to
identify those enemy formations, equipment, facilities, and terrain which
are attacked or control led to ensure success. Targeting is an integral
part of the planning process which begins with the receipt of a mission
and continues through the development of the approved plan. The targeting
process includes the development of a prioritized list specifying what
targets are to be attacked, and what is required to defeat the target.
Figure 7-1 shows the staff functions during the targeting process.
This process supports the commander’s decision on which broad attack
option to use to engage the targets: maneuver, EW, FS, or a combination
thereof; and the determination of the echelons that engage the target. An
assessment of the attack is then conducted to determine the effectiveness
of the targeting process. Although the targeting process is more cornnonly
associated with high and medium intensity conflicts, it also appl ies to
LIC. While spread sheets and target sheets currently do not exist for
LIC, the concept of key personnel meeting together to determine the most
important targets to strike in support of the friendly maneuver commander
HVTS and to detect and attack those targets still applies. The targeting
methodology is characterized by three functions: decide, detect, and
deliver. These three functions are inherently intertwined. Figure 7-2
shows the three functions of the targeting process.
7-1
Receive guidance on:
Commander’s intent.
HPT.
Attack criteria.
Lead time between decision points and TAIs.
Develop:
Future MCOO.
Situation and event templates.
Explain enemy courses of action as part of wargaming. Based on friendly courses of
action, refine event template. Assist in development of HPT matrix and target selection
standards.
Based on commander’s approval or changes of CoA, HPT, attack guidance:
Publish collection plans and SORs.
Brief ASPS, CM&D, TCAE, as appropriate on CoA, HPT, TSS, attack guidance.
Ensure all analysts and collectors understand commander’s intent.
Collect information.
Pass HPT related information and intelligence immediately to FS.
Pass other intelligence and target damage assessments per SOP.
Ensure information collection and intelligence production supports any FRAGOs.
Figure 7-1. The targeting process checklist.
7-2
The DECIDE function is the planning associated with a successful
targeting effort. It requires close interaction between the commander,
intelligence and operating staffs, FS personnel, and various other CS
agencies. The staffs must have a clear understanding of the unit’s
mission, the commander’s concept of the operation and intent, and the
commander’s initial planning guidance with respect to target priorities.
With this information, the staff officers prepare their respective
estimates. From the standpoint of targeting, the FS, intelligence, and
maneuver estimates are interrelated and require close coordination between
the respective elements. The DECIDE function provides a clear picture of
the targeting priorities applicable to the tasking of TA assets,
information processing, the selection of an attack means, and the
requirement for post attack assessment. Specifically, the DECIDE function
is designed to answer the questions:
0 What is it we need to look for?
0 Where and when can it be found?
0 Who can locate and identify it?
0 Which attack option should be used?
0 Will target damage assessment (TDA) be required or possible?
In the DETECT function, the priorities developed in the DECIDE
function are translated into the TA taskings found in the subordinate
unit’s portion of the OPORD and in intelligence and FS annexes. All TA
assets available to the commander are fully utilized. As the TA assets
gather information, they report their findings back to their controlling
headquarters which in turn pass pertinent information to the tasking
7-3
agency. The information gathered is processed to produce valid targets.
Not all the information reported benefits the targeting effort, but it may
be valuable to the development of the overall situation. The target
priorities developed in the DECIDE function help to expedite the
processing of targets. As these targets are developed, appropriate attack
systems are tasked in accordance with the commander’s guidance and
requirements of the attack system managers.
The DELIVER function is the execution portion of the targeting
process. It consists of the selection of the appropriate attack means for
a given target, the tasking of that attack system, and the execution of
the attack by the specified means. If TDA reveals that the commander’s
guidance has not been met, then the entire targeting process continues
focusing on this target.
The targeting effort is continuous. The intelligence, operations, and
FS officers comprise the core of the effort at all echelons. Other staff
officers that are involved with planning and controlling of firepower and
TA also participate. The other staff officers that assist in the process
include representatives of the Air Force (AF), the staff weather officer
(SWO), the aviation officer, the chemical officer, the Army airspace
control officer, the EW staff officers, and the engineer.
The rest of this chapter describes, in detail, the functions required
to plan and engage targets successfully using the DECIDE-DETECT-DELIVER
methodology.
DECIDE
Decisions are critical to the targeting process. They create the
guidelines for the acquisition and engagement of targets. Establishing
these guidelines at the beginning of the DECIDE function allows for a
unity of effort and efficiency that would otherwise not be achieved.
The decisions that are made are reflected in visual products. The
decisions made are what targets should be acquired and attacked, where and
when will the targets likely be found and who can locate them, how the
targets should be attacked, and is TDA required. The products are the HPT
matrix (what targets should be acquired and attacked), target selection
standards (TSS) (what assets can produce targets), the collection plan
(where and when should targets be found and who can find them), and the
attack guidance matrix (how targets should be attacked). The collection
plan is a G2 or S2 product that is important to the targeting process but
is not discussed in detail in this chapter. See FM 34-2 for discussion of
collection plans.
The commander and staff plan for future operations by projecting one
or more alternative courses of action based upon a mission analysis, the
current and projected battle situation, and anticipated opportunities. IPB
is an important process that assists the commander and staff in developing
courses of action.
7-4
The process begins with the receipt of a mission, which higher
headquarters assigns or the commander deduces. The mission statement
directs the focus toward a course of action, in a particular area, against
a specific enemy. The commander then, either with or without input from
the staff, performs mission analysis. This analysis considers tasks that
are performed, the purpose behind the tasks, and the constraints on the
unit, resulting in a restated mission.
The restated mission provides the basis from which to start the staff
estimate process. The intelligence estimate provides key support to
target development. Target development is one of the four IEW tasks:
situation development, target development, EW, and Cl.
IPB AND TARGET DEVELOPMENT
IPB provides most of the information for the intelligence estimate
which impacts on the target development process. IPB is a continuous,
systematic approach to analyzing the enemy, weather, and terrain in a
specific geographical area. This approach evaluates enemy capabilities
and predicts enemy courses of action with respect to specific battlefield
conditions.
It is important for the analyst to understand the effects of
battlefield conditions, especially obscurants, on targeting. Such
conditions drive the need for remote sensors and redundant systems to
ensure proper coverage. The analyst must “see” the battlefield as it is,
and not just as it appears on a map.
The initial IPB effort produces doctrinal templates which convert
enemy OB into graphics and aids in the initial identification of potential
HVTS. HVTS are those assets that the enemy commander feels are critical
to the successful accomplishment of the mission.
Situation templates assist the refinement of HVTS for specific
battlefield and courses of action. Concurrent with situation template
development is an examination of enemy decision and logic trees associated
with each potential course of action. This identifies likely “fail paths”
that provide indications of what might happen if the enemy commander’s
plan fails and what actions comprise the enemy commander’s failure
options. The “fail path” evaluation leads to an identification of
critical enemy functions associated with each enamy course of action and
general HVTS associated with each function. Through BAE, terrain
evaluation, and weather analysis, the enemy course of action is associated
with a specific battlefield. Situation, event, and decision support
templates are developed to identify critical enemy activities and any NAIs
where specific enemy activities or events or lack therefore wil 1 help to
confirm or deny the enemy’s adoption of a particular course of action.
Additionally, DPs or decision phase lines, TAIs, and HPTs are identified.
HPTs are those HVTS that are acquired and successfully attacked to ensure
the success of the friendly commander’s mission.
7-5
TARGET VALUE ANALYSIS
IPB analysis considers terrain, weather, enemy doctrine, and current
enemy actions to arrive at conclusions of what the enemy wi I | do; the
courses of action. Target value analysis (TVA) is a methodology which
identifies potential HVT sets within a given tactical situation. If
successfully countered, they provide a tactical opportunity. This
methodology provides a relative ranking of worth of target sets. TVA
begins when the analyst adopts the place of the enemy commander. The
analyst, in coordination with the G3 or S3, FSO, and other staff members,
wargames the operation. The purpose of wargaming is to finalize
individual staff estimates and to develop a friendly and enemy DST. A
by-product of this is the determination of the enemy assets that are
critical to the success of the enemy mission-HVTS. Target spread sheets
and target sheets are tools used in identifying HVTS. The information
found on these documents is produced during the IPB and wargaming
process. More information on the development and use of these targeting
tools is available in Annex A of FM 6-20-10.
HVTS and HPTs
An HVT is a target whose loss to the enemy can be expected to
contribute to substantial degradation of an important battlefield
function. HPTs are HVTs which, if successfully attacked, contribute
substantially to the success of friendly plans. The G2 or S2 section,
together with the FSO and other staff, nominate HVTS to be HPTs. The key
to HPTs is that they are based on the friendly concept of the operation
and support the friendly force commander’s scheme of maneuver. The
development of HPTs from HVTS is done during the wargaming process. As
the different options are fought by the staff, the G2 or S2 identifies
specific HVTS. The staff discusses or wargames different courses of
action to develop the HPTs. The HPTs for a specific phase of a battle are
recorded on the DST as are the means decided on to deliver the attack.
HVTS include enemy C 2 points, air defense artillery (ADA) assets, and
engineering equipment. If friendly forces were planning an air attack the
enemy C 2 and ADA might be HPTs, while engineers probably would not.
Discussion on templating and IPB is available in Chapter 4 and FM 34-130
The process of designating an HVT as an HPT requires careful staff
coordination. The G2 and collection manager evaluate HVTs at different:
points in the battle to determine if collection assets are capable of
detecting them and providing the necessary target resolution, for example,
time, location, and so forth, to permit effective action (DELIVER). HPTs.
because of their importance, receive priority in the allocation of
detection systems. This priority is weighed against the same systems for
situation development.
The FSO uses target sheets and the knowledge of friendly weapons
systems to determine if there exists a capability to attack the HVT with
lethal assets. The EW officer and others assist the FSO with regard to
non-lethal systems. Availability of a weapon system should not affect the
attack since HPTs have precedence over other targets. Using the
capabilities of the systems to attack the targets, the G2 or S2 analyzes
7-6
and predicts the enemy’s response to each. This analysis determines if
the attack of the HVT is necessary to ensure the success of friendly
operations. The commander uses it in developing attack guidance. The
HVTs that meet the criteria of being acquirable, attachable, and capable
of ensuring friendly success are designated HPTs. In most instances, the
analyst chooses to target enemy elements that have been designated
“critical nodes.’” A critical node is an element, position, or
corrrnunications entity whose disruption or destruction immediately degrades
the ability of a force to command, control, or effectively conduct combat
operations. HPTs are formatted for easy reference in an HPT matrix. The
G3 or FSO prepares this matrix and gives it to the commander for
approval . The selection of HPTs, which also are critical nodes, are
facilitated by a number of already existing enemy studies. Selection of
these critical nodes, coupled with other TVA efforts, al lows friendly
forces to best determine those enemy elements which are HVTS or HPTs.
TARGET SELECTION STANDARDS
TSS are criteria by which personnel determine which systems produce
valid targets, and which require some form of confirmation before their
targets are considered for attack. The development of TSS is a joint
function of the G2 and G3 sections and requires that the capabilities and
limitations of collection assets be known. The CM section of the G2
provides the majority of these capabilities and limitations.
TSS do not determine that the information that the sensor receives is,
in fact, a target. The analyst determines that. TSS reflect the system’s
capabilities to produce targets. TSS are dynamic. The effects of weather
and terrain on both the Collection assets and enemy equipment are taken
into account. TSS are keyed to the tactical situation. Great care is
taken to deal with potential enemy deception, and to ensure the
reliability of the source or agency that is reporting. TSS are designed
to allow targeting personnel in the TOC to readily distinguish between
targets and suspect reports. TSS are developed for all TA systems
available.
Target location errors (TLEs) are the accuracies to which the assets
can locate various targets. The source’s TLE and the timeliness of
information are considered. It is an inherent responsibility for the FSE
to decide which systems have acceptable TLEs for targeting purposes in a
specific tactical situation.
ATTACK OPTIONS
Knowing target vulnerabil ities and the effect an attack on them has on
an enemy operation al lows a staff to propose the most efficient available
attack option. A primary decision here is whether to disrupt, delay, or
limit the enemy.
The opportunity to disrupt, delay, or limit is annotated next to the
target sets on the target spread sheet. It is emphasized that these are
guidelines and each target is attacked based on its own merits.
7-7
Once the staff decides whether a target is best disrupted, delayed, or
limited, they select attack options. Utilizing the situation template and
MCOO, the risk to an asset versus its effectiveness is assessed. The
decision on what attack option to use is made at the same time as the
decision when to acquire and attack the target. Coordination is required
when an attack with two different means, for example, EW and CAS, is
decided upon. These decisions are recorded on the DST and are made during
the wargaming process. This requires that the proper coordination be
performed in a timely manner.
ATTACK GUIDANCE
The commander approves the attack guidance, as recommended by the
staff. This guidance details the specific HPTs to attack, when and how
they should be attacked, and any attack restrictions, The staff developed
and defined all this information during wargaming. Figure 7-3, the attack
guidance matrix, shows a format that this information is put in. The
matrix consists of a column for target categories, specific HPTs, how
targets should be attacked, when they should be attacked, any
restrictions. For a detailed explanation on using the attack gu idance
matrix, refer to FM 6-20-10.
DETECT
DETECT is the next critical function in the targeting process. This
function is perhaps the most important area for future planning. The G2
or S2 is the principal figure in directing the CM effort to detect the
targets identified in the DECIDE phase. The G2 or S2 works closely with
the FAIOs and FSOS to determine requirements for accuracy, identification,
and timeliness for collection systems. The intelligence section is
responsible for ensuring that the collection system asset managers
understand these requirements.
TARGET DETECTION MEANS
The detection of targets is accomplished using all available assets.
Key to the detect function is a focus on the HPTs designated during the
DECIDE phase of the targeting process. This is accomplished by the CM
section of the G2. Every targeting asset is aware of what the commander
designates as HPTs.
Field Artillery Target Acquisition Means
Several detection assets are presently organic to the FA at both corps
and division.
Field Artillery Battalions . FA battalions in DS of maneuver brigades
provide each maneuver battalion headquarters with a FSE to help plan,
direct, and coordinate FS operations. The FSE provides fire support teams
(FIST) to each of the maneuver battalion companies. Forward observers
(FOs) from each FIST are deployed at both company and platoon levels and
may accompany reconnaissance patrols or help to man observation posts
7-8
CAT
HPT
WHEN
HOW
RESTRICTIONS
_
(C3)
1
46,48
1
N EW
COORD ATK WITH EW
(FS)
2
1,2,7
A
N
DNE MRL OLDER THAN 10 MIN.
(ADA)
3
58
P
SIG 2
SEAD PROGRAM 120800A
(ENGR)
4
P
N
COUNTERMOBILITY PROGRAM %
(RSTA)
S
85
P
EW
(REC)
s
103,105
P
N
(POL)
7
A
D
ACCY 0-200 M PER TDA REQ
(AMMO)
8
A
D
(MAINT)
9
P
25%
NOT HIGH VALUE OR PAYOFF
(LIFT)
10
P
N
NOT HIGH VALUE OR PAYOFF
(LOC)
11
P
N G3
NOT HIGH VALUE OR PAYOFF
CAT
=
Target Category (from TVA)
HPT
Designated high payoff target; these targets have priority for engagement Target numbers
from TVA target sheets
How
=
How target Is attacked
—S:
Suppress
—N:
Neutralize
—D:
Destroy
—EW:
Jamming or other offensive EW means
— X%:
Specified percentage of casualties or damage
—G2:
Coordinate attack with G2 (any other person or element could be Indicated)
When
-
When the target should be attacked
— 1 :
Immediately. Interrupt other nonlmmedlate attacks if necessary
—A:
As acquired. Attack as assets are available
—P:
Plan. Include target In a program of fires or file for later attack when the situation changes
Restrictions
—
Any constraint on the attack of targets. Such constraints could be accuracy, time since
acquisition, required coordination, or munition restrictions by amount or type. Other notes
such as "TDA requites” or “Missile target only” could be included.
DNE:
Do not engage
'
Other abbreviations could be used as required by unit mission or SOP.
Figure 7-3. Sample attack guidance matrix.
(OPs) . They are the grass roots of the FA’s TA effort. They observe the
battlefield to detect, identify, locate, and laser designate targets for
suppression, neutralization, or destruction. They report both target ing
data and combat in formation to the maneuver battalion FSO and S2 using
either organic or supporting communications means. The capability of the
FIST to provide real time combat information cannot be emphasized enough.
The battalion FSO receives in formation from and passes information to the
FIST. The FSO continually exchanges targeting data and combat information
with the brigade FSO and elements from the DS FA battalion. The FSO
coordinates with the battalion S2 and S3 to identify and verify targeting
data and combat information derived from the overall collection effort.
The FSO is both a producer and a consumer of combat information.
7-9
Radar Assets . FA TA assets are the principle means for locating active
indirect fire weapons.
Moving target-locating radar (MTLR) detects, locates, and identifies
wheeled vehicles (light or heavy), tracked vehicles, and dismounted
personnel . MTLR is used for surveillance of critical areas such as AAs.
Mortar locating radar detects and locates enemy mortars and artillery
quickly and accurately enough for immediate engagement.
The DS FA battalion S2 has staff supervision responsibility for the
radar. This officer coordinates with the division artillery (DIVARTY)
targeting officer, the DS FA battalion S3, and the FSO at the maneuver
brigade to ensure that both FS and maneuver coverage requirements are
met. Cueing instructions are required. Ml sources provide specific
guidance to orient radar assets before the enemy fires.
Combat Observation Laser Teams (COLTS) . COLTS organic to each heavy and
light division provide a TA capability previously not available on the
battlefield. They are equipped to direct the engagement of targets.
Aerial Fire Support Officers . Aerial FSOS and TA aircraft are organic to
the division and the corps. These assets are highly mobile and cover a
much larger area than ground observers. Assuch, they are particularly
good target detection assets. Targeting data and combat information are
reported to the FSO at the maneuver brigade or battalion, the DIVARTY TOC,
or the fire direction center of the DS artillery battalion.
Air Defense Artillery TA Assets
The forward area alerting radar (FAAR) of the AD units provides a deep
look capability that can detect the location and movement of enemy air
assets. The integration of corps and theater AD efforts enable friendly
forces to obtain an air picture that can potentially cover the entire area
of interest for the echelon in question. Future concepts allow input
directly from theater AD assets into division air situation updates.
Collation of this AD information with other combat information enables us
to locate major enemy air assets, airfields, and refuel ing and rearming
points. Many of these become HPTs in support of the friendly scheme of
maneuver.
DETECTION PROCEDURES
The collection of combat information is integral to the entire DETECT
process. It is essential that all TA assets be used in the most effective
and efficient manner possible. Avoid duplication of effort among the
various assets unless such duplication is desired to confirm the location
or nature of a target. At corps and division, the CM&D section develops
and actively manages the collection plan to avoid such duplication. At
the same time, the CM&D section ensures that no gaps in planning
collection exist. This allows timely combat information to be collected
to answer the commander’s intelligence and TA requirements. This combat
information enables analysts to develop the enemy situation as well as
conduct target development.
7-1 o
To detect the desired HPTs in a timely, accurate manner, clear and
concise taskings are given to those TA systems capable of detecting a
given target. The FS personnel provide the G2 or S2 with the degree of
accuracy that the targets must be located with to be eligible for attack.
The G2 or S2 matches accuracy requirements to the TLEs of the collection
systems. This matching allows the G2 or S2 to develop a more detailed set
of TSS based not only on the acquisition system but also upon the HPTs’
acceptable TLEs that the G2 or S2 gives. These acceptable TLEs cannot be
placed in an SOP as they depend on the situation. Collection efforts
focus on those NAI and TAI that the IPB process identifies during the
DECIDE phase. Knowledge of the target type and its associated signatures
(electronic, visual, thermal) enable friendly forces to direct the most
capable collection asset to be tasked for collection against a given
target. The asset is positioned in the most advantageous location based
on friendly estimates of when and where the enemy target is located.
The decision to limit, disrupt, or delay a given HPT results in a
requirement to detect that target. Information needs, to support the
detection of the target, are expressed as PIR and IR. Their relative
priority is dependent on the importance of the target to the friendly
scheme of maneuver coupled with the commander’s intent. The PIR and IR
that support detection of a target are incorporated into the unit’s
overall collection plan. The collection manager translates the PIR and IR
into SIRS. The collection manager considers the availability and
capabilities of all collection assets within their echelon as well as
those assets available to subordinate, higher, and adjacent units (to
include joint or combined force assets).
As various assets collect the combat information to support target
development, this information is forwarded through the IEW system to the
intelligence analyst at the G2 or S2 staff. The analyst uses this combat
information to perform both situation and target development. When the
analyst detects a target, the target is passed immediately to the FS
element to determine if the target is an HPT, its priority, and if it
meets the TSS. Close coordination among the intelligence staff and the
FSCOORD is essential to ensure that these targets are passed to an attack
system which engages the target. To ensure that this occurs in a timely
manner the FAIO must have access to the ASPS. One technique is for the
FAIO to be physically located in the ASPS or CM&D. Procedures are
establ ished for cueing the FAIO as the predesignated HPTs are identified.
ASPS personnel are aware of HPT. When an HPT is discovered it is passed
without delay to FSE personnel . Usually, a member of the ASPS
hand-carries the intelligence. This allows for consultation at a map and
for intelligence to be placed into context with the overall situation.
The FAIOs coordinate with their respective G2s and FSES to paes the
targets directly to the fire control element at the DIVARTY TOC or, if the
commander approves, directly to a firing unit. This results in the most
efficient and timely engagement of those targets which the FS has
designated in advance for engagement.
7-11
The passing of targets and suspect targets to the staff is
accomplished by a number of means. It is important that essential.
Information that is passed for proper analysis and attack takes place. As
a minimum, the target report includes:
"Date-time group (DTG) of acquisition by the sensor.
"Description of the target.
"Size of the target.
"Target location.
"TLE.
The spec i fic forms and formats for passing target iinformat ion are
specified in the unit SOP.
The DTG is important as the target’s perishability or vuleerability
window is analyzed. This impacts on the urgency of the attack or the
denial of attack based upon the likelihood of the target having moved.
The target description and target size are required to determine
attack means, intensity of attack, number of assets to be corrrnitted, plus
other technical considerations. They are used to compare with the attack
guidance matrix. The target’s location is given as accurately as possible
within the confines of timeliness.
DELIVER
The DELIVER portion of the targeting process executes the target
attack guidance and supports the commander’s battle plan once the HPTs
have been located and identified. This portion of the process has two key
elements—the attack of targets and the TDA of those targets.
ATTACK OF THE TARGETS
The attack of the targets satisfies the attack guidance that was
developed in the DECIDE portion of the targeting process. The attack of
targets requires a number of decisions and actions. The decisions are
described as a set of tactical and technical decisions. Determining the
time for the attack, the attack system, and the required effects on the
target are the tactical decisions to make. Based upon these tactical
decisions, the technical decisions describe the precise attack means, the
unit to conduct the attack, the time of the attack, and in the case of FS
assets, the number and type of munition. The actions in the attack of the
targets are the actual physical attack of the targets by lethal or
non-lethal means. The time of attack of the target is planned or by
opportunity.
Planned Targets
Planned targets are evaluated initially to determine if the DF has
been reached or a trigger event has occurred. If either of these has
7-12
occurred and the resources that were identified to be used against the
target are available, the target is attacked. If the decision is to
attack now, a check is made to determine if the attack system, that we
earlier allocated for the attack of that target, is available. If so, the
attack is conducted with that system. If the allocated attack system is
not available, a decision is made on which other attack asset to use. If
the decision is made to defer the attack, the staff identifies the new DP
to the intelligence or acquisition system.
Targets of Opportunity
Targets of opportunity are evaluated initially as to when they should
be attacked. This decision is based on a number of factors such as the
activity of the target, how long the target can be expected to stay in its
current location (target perishability) and the target’s payoff, relative
to the payoff of the other targets currently being processed for
engagement. If the decision is made to attack now, the target is
processed further. If required, additional information is requested from
the intell igence or acquisition systems. If the decision is made to defer
the attack, then a DP is determined and described to intelligence or
acquisitions systems. Additionally, an assessment of the avai lability and
capabilities of attack systems to engage the target is made. If the
target exceeds either availability or capability of the unit’s attack
systems, then the target should be nominated to a higher headquarters for
attack.
DESIRED EFFECTS
The desired effects on the target are determined. As mentioned
earlier, we either delay, disrupt, or limit the target, based either on
time or terrain, This determination was made earlier in the case of
planned targets. For targets of opportunity, the staff makes the
determination. This decision is made based on the payoff of the target
and the constraints on availability of attack systems and munitions. The
determination of the desired effects is required before selecting an
attack system.
TARGET DAMAGE ASSESSMENT
Assessment of the effects of an attack always is desirable and is
required for certain important targets. The same assets that acquire
targets often provide data on the effectiveness of the attack. The
decision on which targets require assessment is made in the DECIDE
function of the targeting process. Assessment may take many forms besides
the determination of the number of casualties or equipment destroyed.
Other information of use includes whether the targets are moving or
hardening in response to the attack, changes in deception efforts and
techniques, increased communications efforts as the result of jamming, and
whether the damage achieved is having the expected effect on the enemy’s
combat effectiveness.
Assessments also are made passively through the compilation of
information regarding a particular target or area. An example is the
7-13
cessation of fires from an area. If an assessment is to be made of an
attack, the key personnel ensure that the intelligence or acquisition
systems must receive adequate warning so the necessary sensors are
directed at the target at the appropriate time. The assessment results
cause battle plans and earl ier decisions to be changed. If necessary, the
decisions made during the DECIDE portion of the process are reexamined.
IPB products, the HPT matrix, the TSS, the attack guidance matrix, and the
entire battle plan are updated. Assessment allows friendly forces to tune
our efforts to achieve the greatest result with the least amount of
expenditure or risk.
7-14
CHAPTER 8
INTELLIGENCE SUPPORT OF ELECTRONIC WARFARE OPERATIONS
EW is an IEW function that plays a critical role in the AirLand
Battle. Intelligence support is essential to maximize the effectiveness
of EW operations. This chapter describes how intelligence supports EW
operations.
There is a special relationship between EW operations and
intel I igence. EW, situation development, target development, and Cl are
the four major tasks of the IEW mission. ESM, one of the three EW
functions, supports both situation and target development. EW operations
are not unique, however, because they require intelligence to be
successful and also result in the acquisition of additional intelligence.
Both maneuver and FS operations share this characteristic. EW is most
effective when integrated and employed with FS and maneuver. Planning
this integrated employment requires information that permits a comparison
of the courses of action open to the commander. Sources of intelligence
that provide support to EW operations and describe the intelligence used
for specific EW functions are outlined below.
EW requires careful staff coordination to be effective. This includes
coordination within the staff as well as coordination with the Ml unit
executing the plan. The interactions involved are very similar to those
seen in target development. The G3, in coordination with the G2 and the
Ml unit, is responsible for the integration of ECM into the fire and
maneuver scheme. The synchronized use of ECM and lethal attack requires
the electronic warfare section of the G3 to coordinate closely and
constantly with the FSE. To do this, the EWS and the FSO will often be
collocated. ESM are also carefully coordinated between the G2 and the Ml
battalion. The G2 ensures the ESM efforts are matched to the commander’s
PIR and targeting requirements. As these requirements change, the G2
coordinates with the Ml unit to update collection efforts.
INTELLIGENCE COLLECTION TO SUPPORT ELECTRONIC WARFARE
The collection of intelligence to support EW is a multidiscipline
effort. HUMINT, IMINT, and SIGINT all contribute to the support of EW
operations. HUMINT provides invaluable information, such as captured
enemy communications-electron ics (C-E) operation instructions or an
agent’s photograph of an enemy code book contents.
IMINT provides location information important to jamming or intercept
attempts and accurate data on the probable frequency ranges of enemy
emitters. The size and shape of emitter antennas obtained from imagery
provide indications concerning frequency data and other technical
characteristics. A picture of an enemy CP or operational weapons site
provides information about which types of emitter signals, both
communications and noncommunications emissions, are associated with each
other and with specific enemy deployments or weapon systems employment.
8-1
This information permits complex node analysis and parametric analysis of
intercepted signals. This type analysis contributes to SIGINT support of
EW.
Since SIGINT deals directly with information obtained from intercepted
enemy signals, it provides the greatest volume of intelligence support to
EW operations. SIGINT include the same functions as ESM. The Drimary
difference between ESM and SIGINT is how the information is used’,
Generally, ESM produces combat information that can be used for target
development (jamming and FS), maneuver, or threat avoidance with little
systematic analysis or processing. SIGINT requires more extensive
processing to produce intelligence. ESM and SIGINT are mutually
supporting. Information collected through ESM is processed to produce
SIGINT, which is essential to support EW. See FM 34-40, Electronic
Warfare Operations, for a complete discussion on conducting EW operations.
THE EFFECTS OF TERRAIN AND WEATHER ON ELECTRONIC WARFARE
Signal propagation is affected significantly by terrain and
atmospheric conditions. An analysis of these effects is included in any
successful EW planning. The IPB techniques described in Chapter 4 of
this manual and further discussed in FM 34-130, Annex F, provide a useful
tool for evaluating and graphically displaying the effects of the terrain
on EW operations. The analyst creates templates to depict possible enemy
deployment of electronic systems for C 3 , reconnaissance, TA, and REC.
The analyst then compares the effects of the terrain on the employment of
these assets based on a knowledge of signal propagation principles.
Templates depicting locations of friendly ECM and ESM assets and knowledge
of their capabilities also are used to help select friendly EW assets for
employment against specific targets and indicate potential future
deployment sites.
INTELLIGENCE REQUIRED FOR ELECTRONIC WARFARE SUPPORT MEASURES
The requirement to intercept, identify, and locate the sources of
Threat electromagnetic emissions demands an extensive Threat electronic OB
data base. Intercept operations require detailed intelligence on enemy
frequency allocation and signal operating procedures. Identification is
assisted by a knowledge of operating procedures; language recognition, to
include special ized jargon, dialects, and code words; technical parameters
of signals associated with specific functions or echelons; and the
collocation of several types of emitters in a recognizable pattern which
can be associated with a type of function or deployment. DF provides
location data for ESM. As information is collected through ESM and used
to support ECM, it also is compared with and integrated into data base
information to be used for future ESM collection.
INTELLIGENCE REQUIRED FOR ELECTRONIC COUNTERMEASURES
Jamming and electronic deception operations depend on current ESM data
and all the intelligence required for successful ESM operations. Target
receivers are jammed if LOS considerations permit it and the known
frequency on which it is operating is capable of being jammed by friendly
8-2
ECM assets. However, indiscriminate jamming of target receivers is not
the most efficient use of ECM assets. The most effective jamming
requires information on the enemy’s C 3 system so that the effects of
disrupting a particular communications link is anticipated. This expected
effect then is integrated into the commander’s scheme of fire and
maneuver.
Electronic deception operations depend heavily on intelligence. Both
manipulative and simulative electronic deception require intelligence on
the Threat SIGINT and ESM capabilities and a knowledge of friendly
emission patterns and profiles. It would serve no purpose to simulate a
friendly C 2 net or radar surveillance system if the opposing force
cannot intercept or recognize these transmissions. Even the most simple
imitative communications deception attempt, one designed to fool the
operator of a clear voice net for only a few minutes, requires some
knowledge of the target station’s identity and the purpose of the net. A
more sophisticated effort, one designed to confuse an enemy decision
maker, requires not only detai led knowledge of the enemy communications
system but also intelligence concerning the enemy decision-making process.
If the deception effort involves intrusion into or imitation of an
encrypted signal, the intelligence support may require an extensive
multidiscipline effort. See FM 90-2A (C), Electronic Deception, for
detailed discussion on electronic deception operations.
INTELLIGENCE REQUIRED ELECTRONIC COUNTER-COUNTERMEASURES
ECCM is divided into those measures designed to counter both ESM and
ECM. The anti-ESM effort requires much of the same intelligence support
required by manipulative and simulative electronic deception. The primary
intelligence required concerns the enemy SIGINT and ESM capability
evaluated in terms of the assessed vulnerabilities of friendly systems to
such efforts. The counter-SIGINT effort requires technical information
on the capabilities of enemy jammers and any intelligence on the
capability of opposing forces to accomplish electronic deception.
FM 34-60 provides detailed doctrine on counter-SIGINT operations. Threat
doctrine on deception and information on the availability of the equipment
necessary for Threat forces to implement deception activities is
important. Multidiscipline intelligence efforts to obtain information on
enemy ECM equipment before it is deployed is necessary if effective
counter-countermeasures are to be established.
8-3
CHAPTER !3
COUNTERINTELLIGENCE ANALYSIS
Because the hostile intelligence collection threat arraved against US
Forces and agencies is multidiscipline, Countering tnat threat aiso must
be multidiscipline. Such an approach recognizes the need for a single
program which counters all Foreign Intelligence Services collection as
well as an analysis capability to bring it all together. The
multidiscipline counter intelligence (MDCI) analytical effort is dependent
upon information provided by the all-source intelligence system. It is
found at various echelons of command. Specifically--
°The Cl analysis section (CIAS) at division and corps,
"The Cl analysts within EACIC at theater Armv commands.
°The intelligence and threat analysis center (ITAC) at DA.
MDCI analysis is by no means exclusive to Army agencies, but is a
crucial activity of DOD. MDCI analysis operates through the DIA, and
other federal agencies such as the CIA and the FBI. Highly trained,
experienced, and skilled specialists perform MDCI analysis using the
latest technology and modern methods of directing, processing, and
disseminating.
The Cl analyst uses the tools and skills identified in this chapter
and Chapter 4, and as described in detail in FM 34-60. The intelligence
analyst focuses on “how we see the enemy”; the Cl analyst focuses on this
and “how the enemy sees us.” The Cl analyst must also focus on how to
counter the enemy’s collection efforts. Where the intelligence analyst is
a subject matter expert on the enemy, the Cl analyst, in addition to
having an in-depth understanding and expertise on foreign intelligence
collection capabilities, must have a good working knowledge of the
friendly force.
The CIAS must be collocated to integrate information fully with the
ASPS. It must have access to all-source data that can be screened for Cl
use.
The CIAS is under the staff supervision of the Assistant Chief of
Staff G2 and is found in the table of organization and equipment (TOE) of
the EACIC at theater level; the corps tactical operations center support
element (CTOCSE) at corps level; and the division tactical operations
center support element (DTOCSE) at division level . An all-source mix of
special ists is assigned to the CIAS to integrate their various skills and
produce the MDCI analytical products required by the commander at each
echelon. CIAS products are critical to the function of the G3 OPSEC and
deception cells,
The CIAS mission is a diverse and all-encompassing MDCI analytical
effort. The CIAS:
"Analyzes the multidiscipline intelligence collection threat
targeted against friendly forces.
"Assesses enemy intelligence collection threat vulnerabilities and
susceptibility to friendly deception efforts.
"Supports friendly vulnerability assessment.
"Along with the G3 OPSEC staff element, develops, evaluates, and
recommends countermeasures to the commander. These countermeasures
reduce, eliminate, or take advantage of friendly force
vulnerabilties.
"Supports rear operations by identifying collection threats to rear
area units and installations, to include low level agents
responsible for sabotage and subversion.
"Nominates targets for exploitation, neutralization, or
destruct i on.
"Develops and maintains a comprehensive and current MDCI data base.
"Tasks friendly intelligence collection resources through the CM&D
section.
The CIAS focuses on hostile HUMINT, SIGINT, and IMINT collection.
COUNTER HUMAN INTELLIGENCE COLLECTION
Working in a concerted MDCI environment, counter human intelligence
(C-HUMINT) analysts incorporate their efforts into the overall CIAS MDCI
analysis product. C-HUMINT analysis includes:
0 Analyzing and assessing the espionage, terrorism, subversion,
treason, sedition, and sabotage threat.
0 Analyzing enemy HUMINT collection capabilities and activities, and
further analyzing how those collection capabilities can affect the
friendly command.
0 Analyzing level I (enemy controlled agents or partisan collection)
and level II (diversionary and sabotage operations conducted by
unconventional forces) threats.
0 Recommending countermeasures and deception.
0 Nominating targets for exploitation, neutralization, or
elimination.
9-2
COUNTER SIGNALS INTELLIGENCE COLLECTION
Working in a concerted MDCi environment, counter signals intelligence
(C-SIGINT) analysts incorporate their efforts into the overall CIAS MDCI
analysis product. C-SIGINT analysis includes:
"Analyzing and assessing enemy SIGINT col lection capabilities and
activities.
"Comparing enemy collection systems capabillites against friendly
targets.
"Identifying, analyzing, and assessi ng friendly electronic patterns
and signatures.
"Analyzing friendly vulnerabilities against enemy SIGINT collection
efforts.
"Subsequently recommending countermeasures and deception.
"Nominating enemy SIGINT targets for exploitation, neutral ization,
or destruction.
COUNTER IMAGERY INTELLIGENCE COLLECTION
Working in a concerted MDCI environment, counter imagery intelligence
(C-IMINT) analysts incorporate their efforts into the overall CIAS MDCI
product. C-IMINT analysis includes:
"Analyzing and assessing enemy imagery collection capabilities and
activities, to include-grouBif, and space threat systems.
Threat systems include anything from hand-held cameras, to satellite
platforms or fixed- or rotary-wing aircraft and unmanned aerial
vehicles (UAV).
"Measuring enemy co I lection systems against friendly targets.
"Identifying, analyzing, and assessing friendly patterns,
signatures, and vulnerabilities for subsequent development and
recommendation of countermeasures and deception.
"Nominating enemy IMINT systems for exploitation, neutralization,
or destruction.
OTHER INTELLIGENCE SUPPORT TO Cl ANALYSIS.
MDCI cannot be conducted without the support of all three intelligence
discipl ines-SIGINT, HUMINT, and IMINT. These disciplines are used to
collect critical information on enemy collection, analysis, and
dissemination systems. Analysts extract the information from the
al l-source data base within the CIAS to determine enemy collection
capabilities and operations. These systems, coincidentally, collect a
great deal of intelligence on friendly forces. This intelligence is vital
9-3
in evaluating friendly profiles and thereby determining their
vulnerabilities. If the situation warrants, Cl analysts can task friendly
collection systems to specifically collect intelligence on friendly forces
for the CIAS through the CM section.
The Cl mission mandates a wide range of functions and tasks that are
accomplished in peace and at all intensities of conflict. Cl operational
activities perform such functions as investigations, operations, andl
collection. Their products are of great value to the MDCI analyst. To
get the Cl operational reports, the CIAS closely interfaces with the CM&D
section to identify those items of Cl interest coming into the CM&Dfrom
operational Cl personnel . The CIAS must task and receive answers to those
taskings through the CM&D section.
ANALYTICAL PRODUCTS
Each of the specialties assigned to the CIAS has individual
responsibilities and skills which enable the production of
single-discipline analysis products. When these products are combined
into a comprehensive product, an MDCI product emerges. The CIAS then uses
the MDCI product to nominate targets for exploitation, neutralization,
destruction, or elimination. The MDCI products also provide OPSEC or
deception planners with critical information required for their
operations. Various specialists within the CIAS create the products
discussed in the following paragraphs.
Counter Human Intel I i gence Products
C-HUMINT analysts maintain the C-HUM|NT data base. Usj ng this data
base, they produce:
"Association matrixes.
"Activities matrixes.
"Time event charting.
"HUMINT communication diagrams.
° L i n kdi agrams.
"HUMINTT situation overlays.
"HUMINT-related portions of the threat assessment.
"Black, gray, and white lists.
The analytical techniques used in HUMINT analysis enable the analyst
to visualize large amounts of data in graphic form. These analytical
techniques, however, are only tools used to arrive at a logical and
correct solution to a complex problem; the techniques themselves are not
the solution.
9-4
There are three basic techniques (tools.) used as aids in analyzing
HUMINT-re Iated problems. They are time event charting, matrix
manipulat ion, and link diagraming. Used together, these techniques are
c r i t i c a Ito the process of transforming diverse and incomplete bits of
seemingly unrelated data into an understandable overview of an exceedingly
complex situation. See FM 34-60 for detailed discussion on these
techniques.
Counter Signals Intel I igence Products
C-SIGINT analysts maintain the C-SIGlNT data base. Using this data
base, they produce:
"Threat fixed-base SIGINT matrixes. These are developed from the
enemy collector characteristics data base and the threat fixed
station data record.
“Mobile SIGINT matrixes. These are developed from enemy collector
characteristics data base and threat OB and location data records.
"A system quick-reference matrix, providing a quick-reference of
capabilities and limitations of those SIGINT systems which will most
likely threaten that portion of the friendly command for which the
analyst is responsible. This matrix is developed through
manipulation of the data base to gain quick access to information
concerning those systems which are the most likely threats to the
corrrnand.
"SIGINT direction charts, portraying areas or targets of threat
SIGINT concentrations. This is accomplished through integrating the
EEOB overlay with the friendly electromagnetic overlay to determine
areas susceptible to collection.
“SIGINT situation overlays. These are a continuous graphic update
of the EEOB which depicts known or suspected threat SIGINT or REC
positions. These overlays are continuously compared with the
friendly electromagnetic overlay to identify susceptibility to
collection.
"SIGINT-related portions of the threat assessment.
Counter Imagery Intelligence Products
C-IMINT analysts maintain the C-IMINT data base. Using this data base
they produce:
"Threat SATRAN matrixes. (The definition for SATRAN is classified.
See FM 34-60A for explanation.) These are designed to identify when
and where a system is active and also show the collection
characteristics of the system.
9-5
"Threat intelligence collection flight matrixes. These are similar
to the SATRAN matrix, but are concerned “with other platforms used by
the threat. Tracking these collection systems continuously allows
the analyst to analyze threat IMINT collection patterns.
"System component quick-reference matrixes, including threat
system’s capabilities and processing times. This file is a part of
the data base which equates to an OB file on threat IMINT systems.
“IMINT situation overlays. These overlays are the paths from the
SATRAN and threat intelligence collection flight matrixes depicted
on the friendly operations graphics. This identifies areas
susceptible to collection.
"IMINT-related portions of the threat assessment.
COLLECTIVE CIAS PRODUCTS
The CIAS collectively prepares MDCI analytical products, jnciudjng:
"Rear operations IPB (ROIPB) products.
"MDCI graphic summaries (MDCISUM).
"MDCI threat assessments.
"MDCI situation overlays.
"MDCI estimate.
Chapter 3 of FM 34-60 includes a detailed description on how a CIAS
functions and details how to prepare single discipline and MDCI products.
The individual products of C-HUMINT, C-SIGINT, and C-IMINT analysts
become the analytical tools used to produce the MDCI collective products.
A brief description of each collective product follows.
Rear Operations Intelligence Preparation of the Battlefield
IPB is an analytical tool used throughout the Ml community. When a
greater need for intelligence support to rear operations surfaced, the IPB
process evolved into a new dimension and ROIPB surfaced. However, ROIPB
is not confined to the geographical boundaries of the rear area alone. In
addition to analyzing information of the enemy collection threat located
above and beyond the FLOT, it looks at the total friendly AO from the FLOT
back. It does not dupl icate the IPB efforts of the ASPS, but rather
complements their efforts. To avoid duplication, the CIAS must closely
interface with the ASPS.
Like IPB, ROIPB is key in preparing for the next battle. Dur ing
peacetime, ROl PB builds an extensive data base for each potential area in
which threat i ntelligence collectors or battalion size or smaller units
might operate. It analyzes this intelligence base in detail to determine
9-6
the impact of enemy, weather, and terrain on operations and presents it in
graphic form. It has the added ingredient of assisting in the assessment
of friendly courses of action from the enemy’s perspective.
Like IPB, ROIPB graphics can assist the commander in identifying
targets as they enter the battle area. ROIPB and IPB threat evaluation
and integration use the same analytical technique: templating. ROIPB
templates are similar to IPB templates in the MBA. ROIPB templates
provide a comparative intelligence data base that enables the Cl analyst
to graphically portray enemy intelligence collection and small unit
capabilities; depict probable courses of action before and during the
battle; and confirm or refute predictions. Like IPB templates, ROIPB
templates are dynamic and require continual review. For additional
details concerning RIOPB see FMs 34-130 and 34-60.
Multidiscipline Counterintelligence Summary
The MDCISUM is a graphic portrayal of the current enemy situation from
a Cl point of view. It graphically displays known enemy collection units,
as well as level I and II threats within the friendly area. The MDCISUM
ordinarily covers events within a 12-hour period. It portrays friendly
targets which have been identified as potential enemy objective during the
specified time frame. A clear and concise legend appears on each MDCISUM
which contains: time period covered by the MDCISUM, map reference
information, and symbols clearly identifying friendly and enemy
information. Figure 9-1 shows a sample MDCISUM.
J
The use of-colors enhances an MDCISUM: but once reproduced, the
disseminated product is black and white. Therefore, use dots, dashes, and
slashes to ensure consumer understanding; explain these symbols in the
legend. Subsequent MDCISUMs will not repeat information contained on
previous MDCISUMs unless that information is critical to the current
MDCISUM.
Multidiscipline Counterintelligence Threat Assessment
The MDCI threat assessment is a four-paragraph statement which is
publ ished as often as necessary and when significantly changed, depending
on the situation and the needs of the commander. As a general rule, the
MDCI threat assessment is disseminated through CM&D with every third or
fourth MDCISUM. The MDCI threat assessment provides justification for
MDCI target nominations, a primary goal of MDCI analysis. Figure 9-2
shows an example of the format and substance of an MDCI threat assessment.
Multidiscipline Counterintelligence Situation Overlay
The MDCI situation overlay is a composite of the functional area
overlays prepared by the subject matter experts assigned to the CIAS. The
MDCI situation overlay incorporates the most important information from
each of the other overlays. The functional area overlays serve as
<working” overlays, while the MDCI overlay is the master overlay and
serves as the briefing overlay. It should be ready for briefings at all
9-7
9-8
1. ENEMY ACTIVITY DURING PERIOD _ TO _ (LIST DTGs)
A. HUM I NT: Summarize all known HUM I NT activity during reporting
period in one paragraph. Compile data from HUMiNT situation overlay,
matrixes, link diagrams, and MDCISUMs.
B. IMI NT: Summarize all known IMINT activity during the reporting
period in one paragraph. Compile data from iMINT situation overlay,
matrixes, pattern and analysis charts, and MDCISUMs.
C. SIGINT: Summarize all known SIGiNT activity during the '•sporting
period in one paragrap.n. Compile data from SIGINT situation overlay,
matrixes, direction charts, and MDCISUMs.
D. OTHER: Summarize all other enemy activity that is not already
addressed using the same analytical toois.
2. INTELLIGENCE DAMAGE ASSESSMENT FOR THE PERIOD _ TO_(LIST
DTGs)
Briefly assess the intelligence damage to the friendly units for which
the assessment is being prepared. Assessment is based on enemy collection
activities that were traced, analyzed, and reported i r. MDCISUMs and were
measureG against the friendly force operations Drofiie and countermeasures
implemented by the friendly force. Coordination with G3 OPSEC staff
element is essential in preparing this paragraph.
3. PROJECTED ENEMY ACTIVITY ASSESSMENT FOR THE PERIOD _ TO _
(LIST DTGs)
A. HUMINT: Using the same analytical tools identified in paragraph
1A, above, plus IPB, project or assess enemy HUMiNT activity for the next
repor ting period.
B. IMINT: Using the same analytical tools identified in
paragraph IB, above, pius IPB, project or assess enemy IMINT activity for
the next reporting period.
C. SIGINT: Using the same analytical toois identified in paragrach
1C, above, plus IPB, project or assess enemy SIGiNT activity for the next
reporting period.
D. OTHER: Using the same analytical tools identified in paragraph
1C, above, plus IPB, project or assess all other enemy activity for the
next reporting period that is not otherwise addressed in the HUMINT,
IMINT, or SIGINT assessments.
4. TARGET NOMINATIONS:
A. EXPLOITATION: Using aforementioned information and all other MDCi
analytical tools, identify any targets worthy of exploitation. Provide
Figure 9-2. MDCI threat assessment.
9-9
recommended rime frames, locations, methods of exploitation,
justification, and any other pertinent data.
8. NEUTRALIZATION: Usinc aforementioned information ano a!1 other
MDC! analytical tools, identify any targets worthy of neutralization.
Provide recomtianded time frames, methods of neutralization, locations,
justification, and-any other pertinent data.
C. DESTRUCTION OR EXPLOITATION: Using aforementioned information and
all other MDC! analytical tools, identrfy any targets wormy of
destruction or elimination. Provide recommended metnods for engagement,
time frames, locations, justification, and any other pertinent data.
NOTE: A,’* target nominations must have G2 or G3 aoorova! before
dissemination or presentation to trie commander or designated
representative for decision. Coordination with approoriate elements,
consistent with type nomination, is essential.
Figure 9-2. MDCI threat assessment (continued).
CLASSIFICATION
Headquarters
Place
Date, Time, and Zone
MDCI Estimate Number ■
References: Maps, charts, or other documents.
1. Mission: The restated mission determined by the commander. ..
2. The Area of operations: Summarizes the aina lysis of the AO.
a. Weatner :
(1) Factors . Include light data and either a weather forecast or
climatic information, as appropriate. Use appendixes for graphic
representation or weather factors ana other detailed information.
(2) Effect on enemy courses of action . Discuss the effects of
weather on possible enemy courses of action (for example, sabotage,
subversion, raids, air operations) in terms of mobility, concealment, and
logistic sustainability. Discuss in terms of ievei i or II threat, and
enemy all-source intelligence collection operations.
b. Terrain :
(1) Existing situation . Use graphic representatives where
possible especially in regard to cover, concealment, and logistic
Figure 9-3. MDCI estimate.
9-1 o
sustainabi S.ity. Use annexes for .datai led- information. information
covering observation, fields of fire, obstacles, Key terrain, and .
approaches to the probable target aid in determining insurgent terrain.
Also, consider graphics for critical facilities and buildings.
(2) Effect on enemy courses of action . Discuss in the same
manner as for effects of weather in a(2) above. Discuss in detail those
areas favorable and unfavorable to the levels of threat I or II enemy
all-source intelligence collection oppiortun i t ies.
(3) Effect on own courses of action . Discuss in the same manner
as for effects of weather in a(2) above. Note the positive or detrimental
effects on response forces and defensive measures.
c. Other characteristics . Include in subparagraphs any of the
following factors or characteristics which are pertinent to friendly area
activity (emphasis on rear area): population, ethnicity, religious makeup,
literacy rate, medical considerations, economic stabiIity, transportation,
mass media, public services, and current poIitica! situation.
3. Enemy situation . Information on the enemy which will permit later
development of enemy capabilities and vulnerabilities and refinement of
these capabilities into specific course of action and their adoption.
a. Disposition . Reference may be made to overlays, enemy situation
maps, or previously published documents. Location of potential threat
forces may be difficult to pinpoint, but the greater the detail, the more
thorough the analysis. Separate by level and type of threat (that is,
combat (level i and II threats) or intelligence).
b. Comoosition . Summary of the OB of conventional level I and II
threats,_ inteI I igence co!Iection units and elements, and the structure or
organization of p.aram i I i tary and/or terrorist groups! Separate by levei.
and type of threat.
c. Strength . The purpose "of th-is listing fs to 'assist in developing
enemy caoabiUties and vulnerabilities. ConventionaI and inteIIigence
threats are discussed as in a regular intelligence estimate. Terrorist,
paramilitary and other threats need to be assessed based on support from
populace, monetary base, supplies, armament, personnel, and any other
pertinent considerations. Subparagraphs, stroul d be used to address the
different threats. Separate by level and type, of threat..
d. Recent and present significant activities , items of information
are listed to provide bases for analysis to determine relative probability
of adoption of specific courses of action and enemy vulnerabilities.
Enemy failures to take expected act ions are listed as well as positive
information. Such a discussion should include recent all-source
collection activities, terrorist actions, and other indications.
e. Peculiarities and weaknesses . For conventional and intelligence
collection threats, discuss as in an intelligence estimate. For
Figure 9-3. MDCI estimate (continued).
9-11
terrorist, paramilitary, or other unconventional threats, discuss such
pertinent information as leadership (key personalities), equipment,
finances, and relations with the local populace.
4. Enemy capabiIities . Based on all the previous information and
analysis, develop and list enemy capabilities to conduct operations
against the friendly area, with emphasis on the rear area. The listing
provides a basis for analyzing the available information to arrive at
those capabilities that the enemy can adopt as specific courses of action
and their relative probability of adoption. Items should be separated by
levels and type of threat.
a. Enumeration . State what, when, where, in what strength, and by
what method for each enumerated threat.
b. Analysis and discussion . Each enumerated threat is discussed in
terms of indicators of adoption or rejection. The intent is to assess the
likelihood of a given threat taking a given action. This paragraph must
consider all information previously recorded in the estimate. Some
threats may not have any indicators of rejection listed due to
insufficient data.
5. Potential enemy targets . Based on all previous information and
analysis, develop, to the extent possible, a listing of potential enemy
targets. Identify, at a minimum: target identity, capability, location or
projected location, and projected intentions. Ascertain if targets can be
exploited, neutralized, destroyed, or eliminated. Use subparagraphs
and/or annexes as needed.
6. Cone I usions .
a. Effects of AO on own courses of action . Indicate weaknesses in
ability of response forces to react and in defensive measures.
b. HVT analysis based on the CARVE format (criticality,
accessibility, recuperabiIity, vulnerability, and effect) . Such targets
range from bridges to friendly units, public services, and key
facilities. Complete for both friendly and enemy targets.
c. Probable enemy courses of action . Courses of action are Iisted in
order of relative probability of action. However, insufficient data may
only permit the probable level of threat for a given target.
d. Enemy vuInerabiIities . List the effects of peculiarities and
weaknesses that result in vulnerabilities that are exploitable.
Annexes (as required): Annexes may include graphic analysis products
which support the estimate such as link diagrams, association matrixes,
ROIPB products, or black, white, and gray lists distributed to units
requiring them.
CLASSIFICATION
Figure 9-3. MDCI estimate (continued).
9-12
times. Ordinarily, the C IAS operations NCO is responsible for maintaining
the overlay; however, its preparation is a collective effort of all
members of the CIAS.
MULTIDISCIPLINE COUNTERINTELLIGENCE
The CIAS identifies the multitude of intelligence collection
capabilit ies of adversaries on the battlefield. it then narrows the
capabilit ies as accurately as possible to the actual collectors within an
area, their targets, and the collectors technical characteristics. The
CIAS also provides information to the battlefield deception (BAT-D) staff
on the characteristics of friendly equipment so that an “as close as
possible’” replication of a friendly force is displayed to enemy
collectors. This is done during the development of the deception story in
the planning process.
On today’s technical battlefield, the friendly force assumes that
hostile collectors are analyzing friendly patterns of C 3 to find HVTS.
In friendly communications, mostly secure, the enemy must locate the
communications externals that identify specific units or nodes. In
electronic deception, these communications externals are replicated down
to and including specific anomalies in friendly transmissions. Currently,
analysis of such signals parameters is extremely difficult. C-SIGINT
analysts research technical bulletins, coordinate with C-E staff members
and maintenance personnel to collect this information as accurately as
possible for the deception staff. As friendly deception equipment evolves
into the future and becomes more sophisticated, friendly capability to
provide the needed detail of support also must expand.
BAT-D elements become one of the main consumers of the integrated MDCI
products. They use the MDCI estimate and graphic summary to determine
where best to execute deception based on the collection effort.
Specific needs and requirements for BAT-D are passed through G3
channels to the CM&D at each echelon. The CIAS researches its data base
to satisfy these needs with existing intelligence information. If the
CIAS cannot satisfy the requirement immediately, it is validated and
returned to the CM&D for appropriate tasking and requirements management.
When the information is finally collected, it is passed through the CM&D
to the CIAS for analysis and product development. It is then passed to
deception planners so they can develop deception plans or execute the
deception mission.
Since adversaries change the focus of intelligence collection as often
as necessary, the CIAS analyzes its efforts continuously and passes the
changes to the deception cell rapidly. This enables deception personnel
to change focus and evaluate their effectiveness.
INTELLIGENCE SUPPORT TO COMBATTING TERRORISM
Terrorist activities are an ever-increasing threat to Army units,
personnel, equipment, and operations, in peacetime and during conflict.
Cl personnel play a major role in supporting the force protection mission
9-13
through investigation, operation, and intelligence collection directed at
terrorist groups and activities. The CIAS has an additional analytical
role, using C-HUMINT techniques in this manual and fully explained in
FM 34-60.
The MDCI threat assessment is an effective product for providing
information to support the command force protection mission. The process
includes educating the force on the threat, evaluating past activities of
terrorists, maintaining a current data base, using pattern analysis, and
predicting future activities and incidents. The CIAS also recommends
offensive and defensive measures that may be effective in combatting
terrorism.
Combatting terrorism is a shared mission among all members of the
Army. The relationships between the operations staff, intelligence staff,
and military police must be “locked in” completely to be effective. There
are many other players who provide information to the process and to the
intelligence analysis mission. Using the techniques of C-HUMINT analysis,
the friendly goal is to track activities and associations, to predict the
next terrorism act, to determine who is performing the act, when and
where, and to get the information to decision makers who can do something
about it.
9-14
CHAPTER 10
INTELLIGENCE SUPPORT TO COUNTERINSURGENCY
Recent history is characterized by the occurrence of numerous
insurgences in developing nations. The US government has taken the
responsibility to assist, upon request, selected emerging nations in
developing political stability, economic strength, and social progress.
Thus, the US may become involved in a LIC, either in an advisory and
assistance capacity or as a combatant. The analyst plays an important
role in all LIC operations including foreign internal defense and peace
keeping. The focus in operations such as these is different than in
counterinsurgency. Here the analyst is concerned with political questions
such as, “How can the people be made to support tha government?” and ’Who
is the enemy?”’
This chapter describes how information from all sources is analyzed to
produce intelligence to support counterinsurgency. LIC includes
counterinsurgency, but also foreign internal defense, peacetime
contingence ies, and terrorism counteraction. These last three areas are
beyond the scope of this FM.
When the level of US participation with a host nation is sufficient to
be considered a combined activity, a combined intelligence operation is
carried out. Combined intelligence operations facilitate more effective
collection and production capabilities. The host country provides
detailed knowledge and access to the populace, while the US Army provides
technical expertise, management, and advice. There are often varying
degrees of US and host nation cooperation.
The primary responsibility of intelligence personnel engaged in LIC is
to produce intelligence to support the prevention or defeat of an
insurgency. To defeat an insurgency, information is collected and
intelligence produced on virtually all aspects of the internal defense
environment. When insurgents are known to be receiving aid from an
external power, it is necessary to obtain information on the role of the
external power in the insurgency.
The target of the intelligence collection cycle (described in Chapters
1 and 2) for LIC differs from mid- to high-intensity conflicts only in its
application to the production of specific intelligence required for
counterinsurgency operations. In planning, for example, information is
not only needed on the armed insurgents but also on their underground
organization and their relations with the populace as well. In collecting
information, the local population represents one of the most lucrative
sources of information. In processing information into intelligence,
sociological, economical, and political requirements have equal or even
higher priority than conventional military needs. In addition to military
users, US, host nation, and allied governmental, law enforcement, and
intelligence agencies are valid users of intelligence products.
1 o-l
SUPPORT OF COUNTERINSURGENCY OPERATIONS
A sound collection program and proper use of the various collection
agencies and information sources result in a very heavy volume of
information which flows into the intelligence production element. The
insurgent environment and its base area system and political and military
tactics dictate that intelligence requirements can only be met by
reporting minute detai Is on a great variety of subject areas. Each one of
these details appear unrelated to others and insignificant by itself; but
when mapped and chronologically recorded over long periods of time and
analyzed with other details reported, they lead to definitive and
predictable patterns of insurgent activity.
For example, as in a conventional conflict, IPB is conducted before
and continues throughout a LIC. IPB not only helps identify patterns of
insurgent activity, but helps use these patterns to predict future
actions. Appendix E, FM 34-130 fully addresses IPB in support of LIC.
Insurgents usually recognize their shortcomings in military posture.
The insurgent makes maximum use of the weather, the terrain, and the
population, employing secrecy, surprise, and simplicity. Combat plans and
orders are usually simple, comprehensive, and repetitive in order to be
executed by widely separated forces. Therefore, the insurgent’s solution
to a problem is composed of a system or systems which together are
complex, but apart are independent, having simple, logical, and uniform
characteristics. In developing a pattern analysis or IPB products, it is
important to chart insurgent and friendly tactical actions. As actions of
friendly forces disturb the 'environment and patterns of insurgent
activities, it forces the insurgent into unanticipated and unrehearsed
situations which can be exploited tactically. Communications intelligence
(COMINT) is used to obtain direct insights into insurgent operations and
plans. IPB helps the intelligence analyst answer two basic questions:
“Where can we expect to find the enemy?
“Where can we expect not to find the enemy?
The data to be developed and compiled by subject matter varies
considerably with the intensity of the insurgent’s operations. The types
of overlays and categories of subjects plotted, therefore, vary
extensively according to the needs. Using a graphic keying system and
color schemes on large-scale maps greatly facilitate data analysis when
superimposing transparent overlays.
INTELLIGENCE ESTIMATE
IPB provides a basis for the intelligence estimate. As with mid- and
high-intensity operations, IPB products are used extensively in the
estimate. There are, however, some significant differences from these to
estimates that support LIC in general and counterinsurgency specifically:
10-2
"Emphasis is placed on different parts of the estimate. The
mission statement, for example, may be more difficult to compose
because of the wide scope of low-intensity operations and their
relationships with the internal defense program.
"Emphasis is accorded nontactical considerations, such as
psychological, political, sociological, and economic factors.
"Factors are to be compared during the deliberative process.
Advantages and disadvantages of various courses of action may be
more complicated than when terrain, weather, and a visible, tangible
enemy are the chief factors to be considered.
The intelligence estimate for a LIC operation, as in any situation, is
based on all available intelligence and considers everything of
operational significance. See Appendix A for an example of a LIC
intelligence estimate.
The initial intelligence estimate helps to point out gaps in the
intelligence data base. These gaps are a basis for determining
requirements.
A basic requirement in low-intensity operations is a thorough
understanding of the target area. Knowledge of the target society
requires a complete understanding of the internal and external forces at
work, those supporting the integrity of the society, and those engaged in
subverting it. Only when these factors are thoroughly understood can
actions be effected. All available assets are used to provide this
intelligence.
Commanders, intelligence staffs, and analysts recognize the impact
that political, economic, and sociological factors have on tactical
operations of the insurgent and friendly forces. This applies even to a
very narrow, confined, and localized situation. Therefore, an intense and
continuing study of local history and developments, contemporary
personal ities, aspirations, and motivations is made. Because political,
sociological, and economic factors are overlapping and interdependent,
collation and interpretation of this data are extremely intricate and
seldom are reduced to a formula similar to OB for mid- and high-intensity
conflicts.
PROCESSING INFORMATION
Processing is the step in the intelligence cycle whereby information
becomes intelligence. It consists of recording, evaluating, integrating,
and interpreting. Chapter 2 describes information processing. Certain
considerations are unique to the internal defense environment. To
determine insurgent capabilities and courses of action and to provide the
intelligence needed for all facets of LIC, the intelligence analyst is
guided by an awareness of these considerations.
10-3
RECORDING
As in mid- and high-intensity situations, LIC requires large amounts
of information on a continuous basis which are promptly compared with
existing information and intel i igence to determine their significance. To
a large-degree, the extent of the recording effort depends upon the
insurgent activity in the area and the analysts available to maintain and
analyze the recorded information. All of the recording aids mentioned
below, however, serve a unique and useful purpose in the overall
intelligence production effort. Chapter 2 provides a detailed description
of the journal, journal file, intelligence files, and intelligence
workbook. Variations in recording devices which are unique to LIC occur
in the use of annotated overlays and working files.
Annotated Maps
Depending on the echelon of responsibility, the state of insurgent
activity in the area, and the degree of knowledge of the enemy, the
intelligence analyst requires at least two annotated maps: the incident
map and the insurgent SITMAP. Each of these recording devices normally is
a transparent overlay covering a large-scale topographic map of the area.
Unlike the workbook, which is maintained for individual use, the incident
and insurgent SITMAPS provide a ready guide for briefing the commander,
the civil authorities, or other interested parties. If activity in a
particular area is limited, consideration is given to the combination of
the two maps. Other annotated maps are valuable aids for recording
information, depending on the needs in a particular headquarters’ tactical
area of responsibility. These special purpose overlays include records
o f - -
“Mining and booby trap incidents.
“Insurgent names or codes for local terrain features, such as
villages, areas, and trails.
“Insurgent assassination or resource collection attempts.
“Other significant activity.
It may be necessary to enlarge, with significant detail, certa in Als,
either by drawing portions of the map to a larger scale, or by making a
mosaic from aerial photos. Past, present, and potential insurgent
activity must be visible with a detailed ahd thorough understanding^ of the
environment. Comparison of the several annotated maps maintained often
assist the intelligence officer in estimating the enemy’s intentions and
capabilities or to establish trends.
Incident Map . The incident map or overlay provides historical cumulative
information on trends and patterns of insurgent activity. Properly
maintained, the entries enable the intelligence officer to make judgments
about the natuure and location of insurgent targets, the relative intensity
of insurgent interest in specific areas, insurgent control over or support
from the population, and potential areas of insurgent operations.
10-4
Judgments concerning insurgent operations also require knowledge of
terrain factors and insurgent limitations.
insurgent Situation MaQ . The SITMAP or overlay is prepared as part of the
IPB process, and is modified as necessary by information from the incident
map. It is difficult to pinpoint insurgent installations and dispositions
with the same degree of confidence as in a conventional tactical
situation. The insurgents can displace on short notice, making a report
outdated before it is confirmed. While the SITMAP presents an uncertain
and hypothetical picture, composed less of firm information than of
reports of fleeting targets, estimates, and abstractions, it graphically
substantiates the trends or patterns derived from the incident map. The
analyst can then improve the economy and effectiveness of the R&S effort.
Trap Map . The trap map or overlay is used if the insurgent has a
capability for sabotage or terrorist action. Data is directly annotated
on the map on which the situation overlay is placed, or it can be kept
separately. This map portrays particularly attractive target locations
for insurgent sabotage or terrorism, such as road and railroad bridges,
communications centers, theaters and assembly halls, and places where the
terrain favors ambushes and raids. Such areas are identified and analyzed
as part of the area study. They are plainly marked on this map with
attention directed to possible insurgent access and escape routes.
Photographs which are keyed to the map also supplement this effort.
Population Status Map . This consists simply of an overlay to the SITMAP.
Essentially, this map portrays the attitudes of the population, whether
disaffected, loyal, or doubtful. Colors are used effectively to designate
these conditions.
Personalities and Contacts Map . What is known initially about the
insurgent situation primarily is information concerning locations and
activities of individual agents of espionage, agitation, organization, and
liaison. The appearances, movements, meetings, and disappearances of
these agents are recorded on a personalities and contacts map or overlay.
A large-scale map is required (a city street map or town plan if an urban
area is involved). Deviations from regular patterns of movement are
detected in this manner. Depending upon the number of personalities under
surveillance, the regularity of their habits, and the variety of reports
received on them, it is necessary to maintain a separate overlay for each
subject. Old overlays are filed for comparison. Each agent’s route is
portrayed in a different color, and regularly traveled routes
distinguished from new routes. Observations are dated and incidents noted
by symbol. Depending upon the amount of insurgent activity, this map is
combined with the incident map.
Working Files
The intelligence worksheet and the annotated maps serve to isolate
problem areas and formulate relationships between items of information and
intelligence collected. Extensive research material is required, however,
to analyze these problem areas. in the early phase of an insurgency, the
insurgent leader is building an organization. The leader’s organizational
10-5
procedures and tactics, therefore, are unique, and familiarization
requires the intelligence officer to study personal ities and incident
analysis. Extensive working files, such as the insurgency analysis
worksheet, hot files, current propaganda and psychological operations
(PSYOP) file, personality and organization files, area study files,
civil-military operations file, and resource reference files are
established and maintained. Figure 10-1 shows an insurgency analysis
worksheet.
1. US objective (Immediate, short-term, long-term).
2. Nature of society.
a. Social, economic, political, and security conditions.
b. Causes of discontent.
c. Issues.
d. Groups (segments of the population) and forces (groups trying to influence the action of the others).
e. Variables Nkely to Influence the level of violence (coercive potential, Institutionalization, facilitation, legitimacy of
the regime).
3. Nature of insurgency.
a. Leadership,
b. Objectives.
c. Organization.
d. Target groups.
e. External support
f. Timing.
g. Mass support
h. Relationship to legitimate political process.
I. Use of violence.
j. Urban or rural base.
4. Nature of government
a. Objectives.
b. Description of counterinsurgency.
c. Evaluation of counterinsurgency.
(1) Balanced development neutralization, and mobilization programs.
(2) Preemptive and reinforcing aspects of counterinsurgency strategy.
(3) Adherence to operational guidelines.
(4) Evaluation of each counterinsurgency program In terms of likely Impact on each segment of the population.
5. US responae.
a. Possible courses of action.
b. Evaluation of each course of action.
c. Recommendation.
-_I
Figure 10-1. insurgency analysis worksheet.
10-6
Insurgency Analysis Worksheet . The insurgency analysis worksheet helps
identify information and intelligence needed to satisfy the PIR and IR. It
also provides a guide for analysis of a LIC environment.
Hot File . The hot file is the most important working file. It includes
all available material pertaining to an incident or groups of possibly
related incidents that are of current interest. This file contains
material on persons or places likely to be involved in insurgent activity,
together with material on agents or suspects who may be involved. A
reported sabotage plot, for example, could initiate a hot file. The hot
file remains active until the report is refuted, the incident occurs, the
attention of the insurgent is diverted elsewhere, or friendly interest
priorities change.
Current Propaganda and PSYOP File . If propaganda constitutes a major part
of the insurgent effort in the area, a current propaganda and PSYOP file
should contain all pertinent literature, background material, and analyses,
to include copies of propaganda speeches and analyses of local grievances
being exploited or subject to exploitation by the insurgents.
Personality and Organization Files . A local file is maintained on each
insurgent personality. If surveillance is carried out by the local police,
basic identifying and biographical information can be transferredfrom
police dossiers to a card file. This card file helps train friendly
surveillant to recognize key personal ities on siglht. The organization
section of this file includes information on the history and activities of
the insurgent organization’s fronts, other subversive or suspected groups,
and their officers, overlapping directorates, memberships, and liaison
among these organizations. Figure 10-2 shows the format for a personality
card file.
Area Study Files . Area study files contain up-to-date and pertinent data
in the geographic, political, sociological, economic, and cultural fields.
In low-intensity operations, even the lower echelon tactical commander,
particularly when operating in the same general operational
area over extended periods of time, has a definite requirement for such
information. The intelligence staff officer should, therefore, have ready
access to such data. The topical breakdown of such files concerns events
and activities of continuing significance. Thus, for example, if rice is
the basic staple in an economy, the topical breakdown includes files on
rice production, distribution and marketing, price levels, and black
marketeering and pilferage activities. Since this key economic indicator
has continuing influence on friendly military operations as well as on the
insurgent forces who depend on this staple for survival, careful analysis
of this data over a period of time provides patterns based on which
insurgent actions are anticipated and their capabilities predicted.
Resource File . A resource file includes all material which is of
importance but are not of immediate value. It includes inactive incident
files, inactive personality and organization files, and photography. The
latter material is particularly useful. Air or ground photographs of
places of interest are arranged chronologically by location and made
readily available for use with hot files, incident maps, and trap maps.
10-7
Figure 10-2. Personality card file format.
Reference Material . A library is maintained of reference publications,
such as manuals on doctrine, tactics, and methods; books on the area and
on the insurgent threat; files of newspaper and magazine clippings; and
any other material which is of use. This material is kept at a central
library serving the entire staff or located at an area coordination
center.
Coordinate Register . The coordinate register is a valuable analytical
tool , and method to store information during LIC situations. It
illustrates activity in a particular area over a period of time, and is
compact enough to be carried with ease. Each page represents a specific
geographic area or town that the S2 determined. The coordinate register
has two types of pages. One has written entries to record insurgent
activity with space for the S2 to add comments. Figure 10-3 shows a
sample written-entry coordinate register, applicable to a LIC.
ITEM
TIME
COORDINATE
ACTIVITY
NOTES
1.
150930
XK345678
MG harasses site
position patrol south
of site
2.
152230
XK348672
farmer reports 10
guerrillas moving
south
3.
200140
XK348678
individual with
binoculars seen
observing site
increase friendly
surveillance vie. of site
Figure 10-3. Wriften-eiftry' coordinate" regfsfer.
The second type of coordinate register is visual. Entries are plotted
on the overlay square as they appear on the incident map.
The coordinate register assists in trend and pattern analysis and is a
good way to store data, in an easily retrievable manner, for long periods
of time. The written register allows easy evaluation of enemy activity by
type action while the visual one allows rapid comparisons of activity
between several time periods.
Civil-Military Operations File . A civil-military operations file includes
all material and information concerning civil-military operations, their
results, effectiveness, and any countermeasures the insurgents take.
10-9
EVALUATION
Evaluation is the determination of the pertinence of information to
the operation, reliability of the source or agency, and accuracy of the
information. In evaluating information, the knowledge and judgment of the
intelligence analyst plays a major role. In determining the validity of a
fact or whether a reported activity is at all possible, it must be
realized that certain events are possible despite the fact that they did
not previously occur and have been deemed by past analysis as unlikely to
occur. Confirmation of information by other sources and agencies is
always desirable, but it is not always possible to obtain. Initially,
intelligence analysis commences with unconfirmed information which is
subsequently supported, confirmed, or denied by the collection of
additional and related information. As more information is obtained, the
insurgent situation, capabilities, and probable courses of action become
increasingly clear. As the body of intelligence expands, information that
is not compatible with the current insurgent situation and is not
consistent with the recent pattern of insurgent activity is suspect.
Chapter 2 describes evaluation in detail. Procedures governing the
assignment of evaluation ratings to sources and agencies have equal
application in the internal ‘defense environment.
INTEGRATION
Evaluated information becomes intelligence only after it has been
integrated with other information and interpreted to determine its
significance. Integration involves the combining of selected data to form
a pattern which will have meaning and establish a basis for
interpretation. It is important that the intelligence analyst is
sufficiently alert to recognize all the possible patterns that may be
formed. The following example illustrates the mental process of
integration: The intelligence section of the area coordination center
receives information that a prominent labor leader has been murdered. In
a search for related information, the intelligence analyst checks the
incident file, the friendly and suspect personality files, and the
organization file.
The incident file reveals a series of murders that have been linked
with the insurgent, with the primary victims being government officials,
prosperous merchants, and large landholders who opposed insurgent
objectives.
The suspect personality file reveals the labor leader’s controlling
position within a union that has recently intensified its criticism of the
government. The personality file also reveals the labor leader’s close
association with several government officials and recent extensive travel
throughout the nation.
The organization file indicates that the union has recently begun to
disseminate antigovernment leaflets and has threatened to call a strike
if demands for representation in the current government are not met. The
other primary contender for union leadership is a relatively unknown
newcomer.
lo-lo
Once all related items of information from the intelligence files are
obtained, the intelligence analyst begins to assemble the available
information to form as many logical pictures or hypotheses as possible.
Alternative methods of assembly are an essential prerequisite to any valid
interpretation.
Assembly of information to develop logical hypotheses requires good
judgment and considerable background knowledge. In formulating
hypotheses, the intelligence analyst avoids the limitations which result
from preconceived opinions. In the example of the murdered union leader,
the new information is integrated with existing intelligence in several
different ways. By combining the murder with one set of facts, the labor
leader is pictured as a loyal supporter of the government who became the
victim of a campaign of selective terror undertaken by the insurgents. On
the other hand, by combining the murder with another set of acts, the
labor leader is portrayed as a member of the insurgent organization who
was murdered for reasons not connected with the insurgency. As a third
possibility, the labor leader may have been a member of the insurgent
organization who was eliminated by the insurgents. Finally, there is a
fourth possibility that the labor leader and the murder are not connected
with the insurgency.
INTERPRETATION
Interpretation is the result of making deductions as to the probable
meaning of new information and determining its implications with respect
to future insurgent activity. The meaning of the information is
determined in relation to the insurgent situation and the insurgents’
probable courses of action.
For example, in the case mentioned above, if the labor leader was
loyal to the government and was murdered for opposing insurgent control of
the union, it reasonably is expected that further consolidation of
insurgent control over the union, increased antigovernment agitation by
the union, and possibly, an extension of insurgent terrorist activities
will take place.
However, if the labor leader was a member of the insurgent
organization and was murdered by the insurgents, it is conjectured that
the elimination was due to considerable unreliability or slow progression
toward the achievement of insurgent objectives. In this case, the prompt
emergence of another insurgent union leader who ensures more rapid
progress toward insurgent objectives is expected. It also is inferred,
however, that the labor leader was murdered as a result of a struggle for
power within the insurgent organization. In this case, weaker insurgent
control of the union is expected due to the dissension among the
insurgents.
Finally, if the labor leader had no connection with the insurgent
organization and was murdered for reasons unconnected with the insurgency,
this event has no significance from an intelligence standpoint.
10-11
DISSEMINATION
One of the more critical aspects of intelligence is the rapid
dissemination of the information to personnel and units that nead
information. Each information report is looked at immediately to see if
it is of immediate concern. If so, it needs to be disseminated to
affected units or personnel without delay. Successful intelligence
reporting communicates the results of analysis and combat information to
the right people, at the right time, and in the right format. It provides
the commander with tha information and intelligence needed to raduce risk
and uncertainty. The dissemination channel in a LIC varies little from
the conventional environment but often there are more agencies and
individuals to consider: police, potential terrorist targets, and other
civilian agencies operating in the AO. Also, intelligence is disseminated
to host nation military units.
Local SOP and guidance from higher headquarters dictate the amount and
type of information that is given to civilian agencies and host
national military forces. This question of releasability is resolved
before effective dissemination can exist.
ORDER OF BATTLE
Chapter 3 describes the production of OB intelligence. There are
certain OB considerations, however, which are unique to the insurgent
enemy. OB intelligence is equally as important in an insurgency as in
conventional combat operations. However, some differences in nomenclature
and approach must be recognized. The applicability of the various OB
factors differs in an insurgency from conventional operations, and there
also are differences in applicability between phase I and phase II
insurgency situations,
The elements of OB intelligence (OB factors) are not independent of
each other; they are closely related and are considered as a whole,
Information on one of the elements often leads to a reevaluation or
alteration of information previously received on another element.
Furthermore, the general rule, whereby OB intelligence is
developed and maintained down to and including two echelons below the
analyst's own level of command, does not apply to low-intensity
operations. Due to the nature of the insurgency and the phased
development of the insurgent forces, OB intelligence is produced in much
greater detail and pertains to much lower echelons (even down to squad)
than in conventional combat operations.
During phase I of an insurgency, subversive activities range from
being only a potential threat to frequently occurring activities along an
organized pattern. No major outbreak of violence or uncontrolled
insurgent activity exists. The insurgent is primarily concerned with
organizing infrastructure during this phase, along with conducting PSYOP
and terrorist attacks.
10-12
Phase II of an insurgency begins when the insurgent has gained
sufficient local or external support to initiate organized guerrilla
warfare against the government.
A phase III insurgency occurs when the insurgent has transitioned from
a guerrilla-oriented force to a primarily conventional-oriented force.
FM 100-20 describes, in detail, the goals and activities of insurgent
forces during all three phases. An important point to remember is that
the insurgent may be operating from areas outside the host country during
all three phases. Therefore, geographic boundaries cannot limit
intelligence collection and analysis.
A listing of the OB factors follows, together with a brief explanation
of their applicability and means in the context of insurgency situations.
COMPOSITION
In some insurgent movements, military force is only one of several
instruments through which the insurgent movement seeks power. Development
of a military force often has the lowest priority during the early stages
of an insurgency. As long as the party core and civil organizations are
establ ished and move effectively toward the goal of the insurgency, the
military arm either lies dormant or simply exists in cadre form until
needed as a supporting force. Even after military organizations are
fielded, the infrastructure never loses its importance. A
counterinsurgency operation is never over until the infrastructure is
neutralized.
Phase I Considerations
Rather than collecting information on the identification and
organization of specific enemy units, we are concerned with the internal
workings of insurgent activity groups. Knowledge of the composition of
insurgent groups is a key to the entire planned course of the insurgency
Details of composition include the appearance of new organizations, the
relative amount of enemy effort expended in rural and urban operations,
the internal chain of C 2 , and the manner in which insurgent groups are
organized for operations .
Phase II Considerations
The intelligence analyst is concerned here with determining the
composition of insurgent combat units, including their organization and
chain of command. The degree of sophistication encountered indicates
other factors, such as training, logistics, and strength. Armed platoons
or small terrorist cells indicate that the overt military portion of the
insurgents' plan is just beginning, and armed battalions and large urban
terrorist groups indicate that there is a serious menace to the current
government.
10-13
POLITICAL STRUCTURE
A tightly disciplined party organization, formally structured to
parallel the existing government hierarchy in the country, is found at the
center of some insurgent movements. In most instances, this
organizational structure consists of committed organizations at the
village, district, province, interprovincial, and national levels. Within
major divisions and sections of an insurgent military headquarters,
totally distinct, but parallel, command channels exist. These are the
military chain of command and the political channels of control. Whether
it is through a political division of an insurgent military headquarters,
a party cell or group in an insurgent military unit, or a unit political
officer, the party ensures complete domination over the military structure
by use of its own parallel organization. These party organizations fuel
mil itary action. Should the military arm be eliminated, and the party
left intact, only short-term security is achieved. The party begins
construction of a new military organization. The population only is safe
when the insurgent’s political structure is rendered ineffective.
COMBAT FORCES
The organization of insurgent combat forces is dependent upon the
need, the tactics to be employed, and the availability of personnel and
equipment. Frequently, subordinate elements of insurgent units are
employed independently. The intelligence analyst who receives a confirmed
report of a subordinate element of an insurgent unit operating in the area
cannot, therefore, assume that the parent unit is also present.
Identification of insurgent units are by--
"Number.
"Commander’s name.
"Nickname.
"Code designation.
"Name of the area in which it operates.
Unit designations are frequently changed and multiple designations are
often used to confuse friendly intelligence. It follows that the
intelligence analyst is not able to determine the size and strength of an
insurgent unit merely by obtaining a unit identification.
DISPOSITION
Determination of the disposition of the insurgent involves the
location of operational training and supply bases, LOC, and areas of
political control. The intelligence analyst arrives at potential
dispositions of the insurgent combat forces by developing patterns of
activity based upon map study and knowledge of insurgent tactics.
Insurgent base areas, for instance, normally are located near areas that
10-14
the insurgents politically control, thereby providing an early warning
system. By plotting insurgent sightings and combining this information
with weather conditions, time factors, detailed investigation of insurgent
incidents, and after action reports, the analyst best selects possible
enemy dispositions as well as possible areas of tactical deployment.
Consideration should also be given to areas where no insurgent activity is
reported. These areas, while appearing to be under the control of
internal defense forces, may be under the political control of the
insurgents.
Phase I Considerations
The location, deployment within this location, and any movements of
insurgent organizations or personnel are of concern here. The enemy’s
strength and tactics are revealed, to some extent, by discovering whether
this effort is concentrated in a few places or dispersed throughout the
target country and neighboring nations. If the enemy’s effort is
initially concentrated in one city or in one rural area, then the extent
and spread of the insurgent organizations are a key to how long the enemy
has been operational and how successful the enemy has been, and is an
indication of the enemy’s appraisal of friendly strength. In a nation
considered a relatively easy conquest, the enemy begins with many
operations, rather than a few. By studying the other available elements
of 06 intelligence, the intelligence analyst determines such things as
whether the movement of an enemy cadre or group is an advance toward new
goals or a retreat from an unprofitable operation.
Phase II Considerations
How the insurgent forces are deployed indicates whether the enemy is
making a widespread show of strength, with units scattered about the
country, or is concentrating forces around a few key targets. It also
shows whether the enemy is going to concentrate on such activities as
interdicting transportation or actively seeking battle with government
forces.
STRENGTH
The strength of the insurgent forces is thought of in terms of the
combat forces, political cadres, and popular support. Conventional
methods of strength computation are appl ied in determining insurgent
combat forces strength. The analyst should be aware, however, that the
insurgent will attempt to have strengths overestimated by low-intensity
operations forces. To give this false impression, the insurgent employs
rapid unit movement and uses multiple designations for a single element.
Reports from the populace concerning the strength of the insurgent forces
should be viewed with caution and the importance of actual counts of enemy
personnel stressed. Certain insurgent-initiated incidents provide useful
indicators of the strength of the insurgents in a particular area. An
example of these is an increase in raids with subsequent loss of weapons
by friendly forces. The determination of popular support for the
insurgents is a more difficult task and is stated best in terms of the
10-15
percentage of an area under government control, as opposed to the
percentage under insurgent control, with both viewed together in terms of
population density. A useful indicator of the extent of insurgent
political control is the willingness of the populace to report information
concerning the insurgents.
Phase I Considerations
The cadre who organize and activate the movement usually are highly
trained, aggressive professionals who exercise an influence
disproportionate to their actual numbers. The analyst also is concerned
with the number of enemy units in existence, which in phase I means
identifying and evaluating new groups and organizations which have either
appeared in the host nation or in neighboring countries and any changes in
the size of existent groups. Other types of equipment, besides weapons,
are of paramount interest. A printing press in phase I is a deadlier
weapon than a battalion of artillery in phase III.
Phase II Considerations
The actual number of personnel available to the insurgent now assumes
the importance it lacked, to some degree, in phase 1. By knowing also the
amount of weapons and equipment available, estimates of capabilities
against friendly forces are formulated. The degree of popular support for
the insurgent manifests itself in such areas as recruiting for forces, tax
or resource collection, and degree of population support for friendly
forces.
TACT ICS
Tactics include both enemy doctrine and the conduct of operations
according to that doctrine. Insurgent forces are more flexible in their
application |of doctrine than regular military organizations. The doctrine
which guides the insurgent must be known and understood by friendly forces
if they are to effectively counter insurgent efforts. The careful
examination of the tactics, or actual operational techniques, reveals
changes in doctrine as well as indications of the personality and
competence of the insurgent leader. Again, the choice and application of
tactics is a reflection of insurgent appraisal of friendly strength as
well as of personnel strength. A continuing estimate of relative
strengths is a very basic part of insurgent operational planning and has
an immediate effect on tactics. Tactics of the insurgent involve
political, military, psychological, and economic considerations, all
closely integrated. They vary with the phase of the insurgency. The
political goal of the insurgents is to undermine and discredit the
established government.
Phase I Considerations
Phase I insurgency is characterized by a relative absence of stri ctly
military operations and an emphasis on subversion and organizational
development. Although instances of terrorism begin to occur in the later
10-16
stages of phase 1, military activity is usually limited to recruiting and
establishment of military cadres.
Phase II Considerations
An increased emphasis on the study and evaluation of insurgent
military tactics is required. Tactics during phase II are generally
limited to ambushes, raids, sabotage, and terrorism. These activities
provide the insurgent with supplies, experience, and self-confidence,
while at the same time they erode friendly morale and reduce friendly
economic and military capabilities.
TRAINING
Insurgent training is closely related to the tactics being employed
and includes vigorous indoctrination in political affairs. Both the
combat forces and the people within an area under the political domination
of the insurgents receive training. Insurgents carefully plan and train
for individual operations and phases of movement. A careful analysis of
an area with respect to the type of training taking place provides a
useful indicator of the probable courses of action that are employed
against friendly forces.
Phase I Considerations
During phase I, the insurgent trains and indoctrinates existing cadre
as well as newly accepted or recruited indigenous personnel. Training
consists of a great deal of political indoctrination along with techniques
of propaganda, communications, and intelligence collection. Training and
effectiveness go hand in hand; the type, amount, and val idity of training
received by the insurgents is determined, to some degree, by any observed
increase in the effectiveness or size of the insurgent movement. Some
training normally is conducted in another country and is indicated by a
change in number and type of personnel travel ing to that country.
Phase II Considerations
Much attention now is devoted to locating training camps and areas,
identifying training cadres, and interdicting the movement of insurgents
to and from out-of-country training areas. Some insurgent units are
identifiable as having been trained for special missions, such as
reconnaissance, demolition, or even suicide attack missions.
LOGISTICS
In an insurgency, as in a conventional warfare situation, the
effectiveness of the insurgent is very much dependent on the logistical
support. In the early stages of an insurgency, the requirements for
military equipment and supplies are less than in the later stages.
Accurate intelligence on the insurgent’s sources and availab i lity of
supplies and equipment is essential to determine the capabil i ty to
maintain and expand the insurgency.
10-17
Phase I Considerations
Two particular items always are essential to the phase I
insurgent--money and a printing press. If highly successful in the
establishment and motivation of the power base, the insurgent never really
has a requirement for the usual items of military supply. Money is often
supplied from abroad, but such occurrences as bank robberies, unusual or
excessive fund drives, payroll deduction requests, or sudden affluence
among suspect government officials are cause for suspicion. Equipment for
the production and dissemination of propaganda, like printing presses and
radio sets, is of a special nature, and its acquisition by insurgent
forces indicates an increasing level of sophistication in propaganda
efforts.
Phase II Considerations
Logistics is now a larger and more elaborate requirement for the
insurgent, who must now procure, store, transport, and maintain weapons,
ammunition, explosives, signal equipment, and medical supplies. A much
larger number of people are required to operate the logistical system.
Insurgent supply caches or supply lines become items of critical concern
to friendly forces. Borders and coastlines are controlled and aerial
surveillance of remote areas or areas known to be used by the insurgents
must be instituted to detect or deter the movement of supplies.
EFFECTIVENESS
Effectiveness describes the qualitative ability of the insurgent to
achieve poI itical or military purposes.
Phase I Considerations
In phase I, the term “combat effectiveness’” is usually not
applicable. While the insurgent uses words like “struggle”’ and “front,”’
they do not connote the use of armed force. The overall effectiveness of
the insurgent effort is sometimes made very obvious by spectacular
successes (antigovernment victory in an important election) or failures
(collapse of a new factory-worker organization known to have been backed
by the insurgent), A continuing decline of governmental influence in a
certain area or among a certain group of people may well indicate a
corresponding increase in insurgent influence. The leaders forbid overt
or easily detectable actions until they feel that their movement is in
position to make a serious bid for power. In this case, the insurgent's
real effectiveness remains unknown until it is too late for anything but a
historical account of it. There usually is overt indication of the
effectiveness of the insurgent operation, and information on it is
gathered by careful observation of organizations, movements, and elections
at all levels. Penetration of these activities by government agents is
very desirable and makes a significant contribution to the OB picture.
10-18
Phase II Considerations
The factor of effectiveness now expands to include combat efficiency
of insurgent military forces. By carefully evaluating the other OB
factors, and taking note of actual combat experience, we evaluate the
insurgent’s combat effectiveness or lack thereof. We determine the
insurgent’s strengths and weaknesses and, from this, calculate the
capability to follow various courses of action.
PERSONALITIES
Personalities are not listed as a separate OB factor in Chapter 3. In
an insurgency, personal ities often assume a greater importance than in
mid- and high-intensity conflicts.
Phase I Considerations
In phase I, personalities are an extremely important factor. During
this phase, when the insurgency is just beginning to organize, function,
and attempt to spread its influence, the loss of a comparatively small
number of personnel practically destroys it or at least sets back its
progress. Unfavorable publicity attached to the movement, as a result of
exposure, renders its success less likely. The apprehension, compromise,
or exposure of its leaders destroy the insurgency completely. Knowing who
the insurgent leaders are also furnishes a valuable indication of how
tactics and training are conducted and how effective the overall effort
is.
Phase II Considerations
As in phase I, personalities remain a critical concern. Many
insurgent units are cat led by their commander’s name, rather than having a
conventional designation.
ELECTRONIC TECHNICAL DATA
In the early stages, there is often a lack of uniform communications
procedures, preventing the development of an extensive enemy electronic
order of battle (EEOB) and electronic technical data base. There is very
little use of noncommunications equipment, such as radar. The insurgents
often use HF shortwave or ham radio sets to serve the initial “Committee
of Correspondence” function. VHF citizen band sets play a role in early
terrorist operations. Equipment available to the insurgent ranges from
the most primitive to the most modern. Even equipment not generally
available in the armed forces of major world powers, I ike spread spectrum
and frequency hoppers, is easily obtained.
Phase I Considerations
The propaganda requirements result in insurgent-sponsored medium
frequency or commercial radio AM broadcasts. Transmitters are located
outside the national boundaries or in remote, inaccessible areas. These
broadcasts frequently use code words to control and coordinate insurgent
10-19
operations. Later, there is some increased use of VHF transmissions and
more organized communications procedures. The standardization of
communications practices reflects the level of communications training
expertise.
Phase II Considerations
Much more extensive use of communications equipment characterizes this
phase. Equipment is captured from government sources, purchased or stolen
from commercial sources, provided by external sponsors, or locally
manufactured. Communications procedures reflect doctrine and training
practices of an external sponsor. Insurgents use repeater transmitters,
set to receive and rebroadcast on the same frequency, to degrade VHF DF
efforts against them.
MISCELLANEOUS
Any other items which contribute to knowledge of the insurgent, such
as goals and methods, are considered here.
Phase I Considerations
This category includes such items as historical studies of people and
parties involved in the insurgency, code names or numbers, and any’ other
information which does not fit under the other eight categories. “This
type of information should not be siighted, as seem ngly superfluous items
may wel I become useful and important.
Phase II Considerations
Several miscellaneous items now become vital adjuncts to the other
factors. Weapons, insignia, code names and numbers, types and colors of
uniforms and flags--all these things aid in the identification of
insurgent units, the source of outside aid, the source of weapons and
equipment smuggled into or purchased in the target nations, and the morale
and effectiveness of the insurgent armed forces,
OB FACTORS SUMMARY
There are three points to remember in the application of OB factors to
an insurgency:
"The nine OB factors previously discussed are iclosely interrelated
and cannot be analyzed separately.
"When an insurgency escalates from a phase I to a phase II
situation, the OB effort is expanded considerably. The enemy combat
units must now be considered in addition to the various
phase I organizations and activities, which still are active.
“When ah insurgency escalates from a phase II to a phase III
situation, the application of the OB factors to the insurgent’s
combat units is the same as for other conventional forces.
10-20
APPENDIX A
REPORT FORMATS
The report formats described are standard formats used to report
intelligence or information to task assets, or to receive information,
intelligence orders, or instructions. These formats are echelon-specific,
like the patrol report usually prepared at battalion level, or are general
reports used at all echelons, like spot reports.
This appendix provides a brief description of the most common
intelligence-related formats, including those formats used to pass
information of immediate potential intelligence value from one echelon to
another. It also identifies the echelon or echelons where each format is
most used and the element or individual responsible for preparing it. An
example of each format is also provided. Additional information about
report formats is in Chapter 8.
SPOT REPORT
The SALUTE mnemonic requires users to report enemy size, activity,
location, unit (or uniform), time, and equipment. Figure A-1 shows a spot
report using a SALUTE message format.
FROM: S5i b7TH INF-, 3D BDE
TO: GR 20TH INF DIV
COMBAT OUTPOST NO 2b:--A/a/b7 PATROL REPORTS SIGHTING FOUR ENEMY
TANKS MOVING WEST ALONG SECONDARY ROAD AT GRID COORD NBblBBIT AT
241730Z HR. TANKS TRAVELLING AT APPROX S KPH- HATCHES WERE
OPEN AND VISIBLE ENEMY PERSONNEL WERE WEARING PROTECTIVE MASKS-
UNIT MARKINGS WERE NOT VISIBLE BECAUSE THEY WERE COVERED WITH
MUD AND SANDBAGS.
Figure A-l. SALUTE messageformat.
INTELLIGENCE ESTIMATE
The intelligence estimate consists of five paragraphs. The first
paragraph is a restatement of the mission. The remaining paragraphs
outline an analysis of the battlefield area based on IPB; an estimate of
enemy strengths, capabilities, and limitations; and the intelligence
officer’s conclusions about the total effects of the AO on friendly
courses of action, the courses of action meet likely to be adopted by the
enemy, and the effects of exploitable enemy vulnerabil ities. The five
paragraphs are--
“Mission.
“Area of operations.
A-1
“Enemy situation.
“Enemy capabilities.
"Conclusions.
MISSION
Paragraph 1. Describe the mission in a short, clear, and concise
restatement of the assigned or assumed mission of the command.
AREA OF OPERATIONS
Paragraph 2. Discuss what influence the AO has on probable enemy
courses of action, based on facts and conclusions derived from IPB and an
analysis of the AO if one has been prepared. A previously prepared
analysis of the AO also is referenced. However, if previously prepared
or other reference material is not contained in this paragraph, it must
contain enough information to support the conclusions.
Weather and terrain analysis derived from IPB are always included in
the characteristics of the AO. Other characteristics are included if they
are important to either force in selecting courses of action to carry out
their assigned or assumed mission. These other characteristics are of
greater importance In AOs which have large civilian populations and to
commands with extensive territorial or CSS responsibilities. Detailed or
supporting terrain and weather information is included in an appendix to
the intelligence estimate.
Weather or terrain effects on the use of nuclear weapons and chemical
and biological agents are discussed when either combatant has the
capability to use them. Each description of enemy courses of action
includes the possible enemy or friendly use of these weapons, including
the impact that weather or terrain conditions has on weapons systems and
delivery means.
Weather
Weather conditions are those factors that impact on current and
planned operations. This includes appropriate light data and either a
weather forecast or climatic information. When operations cover a long
period or are programed for a future operation, climatic information
replaces weather data forecasts. Light data, in tabular form, includes
the beginning of morning nautical twilight (BMNT) and beginning of morning
civil twilight (BMCT), ending of evening civil twilight (EECT), and the
ending of evening nautical twilight (EENT), moonrise, moonset, phases of
the moon, and other information as required.
Terrain
The existing terrain situation includes the tactical aspects of the
area: observation and fire, concealment and cover, obstacles, key terra >n
features, and AAs. Each of these aspects is oriented based on its
A-2
influence on selected courses of action by either force. For example, in
a CSS unit, the discussion of concealment and cover is oriented toward
influence on CSS courses of action, including installation locations
required to accomplish the CSS mission and on enemy forces which
interfere with the accomplishment of the mission. In CSS unit
intelligence estimates, key terrain features are omitted unless the enemy
has the capability to seize or control terrain features which materially
affect the accomplishment of the mission.
Other Considerations
Other characteristics which are considered pertinent are sociology,
politics, economics, and psychology, science, materiel, transportation,
manpower, and hydrography.
The effects of each characteristic of the AO on possible enemy courses
of action normally include consideration of weather, terrain, and NBC
capabilities, the effects of these on other possible enemy courses of
action, and the possible use of particular weapons, methods, techniques,
or forces.
The extent of consideration for the factors is limited by the mission.
For example, when the mission is offensive, the discussion does not
include defensive courses of action. It does, however, include security
considerations.
ENEMY SITUATION
Paragraph 3. Provide information on the enemy which permits later
development of enemy capabilities and vulnerabilities. Establish the
basis for refining these capabilities into a specific course of action and
for determining the probability that the enemy will adopt this course of
action.
Paragraph 3 provides the following data on the enemy:
"Disposition,
"Composition.
"Strength.
"Recent and present s ignificant activities.
"Peculiarities and weaknesses.
Disposition
Enemy dispositions are the known or estimated locations and sizes of
enemy units. References are made to overlays, enemy SITMAPS, or
previously published documents when discussing enemy disposit i ens.
However, if these references are not readily available, they (or a copy of
them) are attached as appendixes to the intelligence estimate .
A-3
Composition
Composition is 06 data that is used to determine the strength the
enemy uses to prevent the accomplishment of the mission. List all the
units, including insurgent and guerrilla-type forces that contribute to
this. Include such supporting units as air, nuclear delivery, and REC
units that also affect the accomplishment of the mission. In determining
which enemy units affect mission accomplishment, time and space factors
are also considered.
Strength
Strength is all opposing enemy forces which are logically employed
against the command in time to affect the accomplishment of the mission.
The total forces listed cannot exceed, but is equal to or less than the
total forces listed under composition.
Enemy strength includes committed forces, reinforcements, air assets,
and NBC operations. Air or NBC operations units are omitted when the
enemy lacks such capabilities.
Committed Forces , Committed forces are those enemy ground maneuver units
currently in contact and those ground maneuver units with which imminent
contact is expected, regardless of the specific friendly course of action
implemented. Designation of enemy forces as committed forces depends on
disposition, location, controlling headquarters, and doctrine. For more
information on computing enemy strength, see Appendix D.
Reinforcements . Reinforcements are those enemy maneuver units that are
not committed in or out of the friendly sector, but react to the friendly
course of action in time to influence the accomplishment of the mission.
Contact with these units is not expected. Disposition, location, level of
control , or other factors are considered in determining which enemy forces
are reinforcements.
Enemy Air Capability . The enemy air capability is based upon numbers of
enemy aircraft within operational radius, maintenance facilities, expected
attrition, ground tactical situation, and other factors. The supporting
tactical air force furnishes intelligence on the number of sorties, by
type, which the enemy is expected to make within the field army or
comparable areas. The estimate is not usually prorated below the
field army level. Also, no attempt is made to calculate the number of
sorties the enemy can or may make against a subordinate command of the
field army or the communications zone (COMMZ). Corps, division, and COMMZ
command intelligence officers usually quote the estimate furnished by the
higher headquarters in stating enemy air capabilities. For example, a
corps or division G2 might state: “30th Army estimates that the enemy can
be expected to attack within the army area with as many as 150 fighter,
100 attack, and 75 bomber sorties daily. By massing all aircraft within
operational radius, the enemy can make a maximum of 250 fighter, 300
attack, and 250 bomber sorties daily.”
A-4
Nuclear Weapons and Chemical and Biological Agents . Estimates of enemy
NBC capabilities usually are prepared at field army and hlglner
headquarters. Units below field army level usually lack the means to
gather the information to make such estimates. They use the estimates of
the higher headquarters and modify them with available information.
The determination of enemy NBC operation capabilities is based
primarily on estimates of numbers and types of weapons and amount and
types of agents available, knowledge of enemy doctrine, past experience,
and estimates of enemy capabilities involving the employment of ground
troops. As with the enemy air capability, it is rarely feasible to
estimate what portion of the available enemy NBC effort is used against a
division or corps within a field army or a command in the COMMZ. It is
also rarely feasible to estimate the number of nuclear weapons the enemy
is capable of using within a period as short as one day. The period
selected is a month or other period depending on the available information
and past experience.
The statement of the enemy’s capability to use chemical and biological
agents includes the amount, typa, and delivery means of avai lab I e chemical
and biological agents.
Recent and Present Significant Activities
This is a summary of recent and current enemy activities which serve
as indicators of future enemy actions. Significant enemy failures to take
action also are listed. For example, if the enemy is apparently defending
behind a river obstacle but has failed to destroy certain bridges, the
omission is listed as a significant activity. Any basis for a belief that
the enemy has specific knowledge of the friendly situation or intentions
also is listed. For example, a capture by the enemy of an OPORD or a
compromise of current signal operating instructions would be noted. For
more information on enemy indicators, see Appendix C.
Peculiarities and Weaknesses
Briefly discuss each enemy peculiarity and weakness, indicating the
extent to which it is a vulnerability and how it affects the selection of
broad friendly courses of action. For example, if the enemy has an open
flank, the fact is stated under operations. Discuss the extent to which
the open flank constitutes an exploitable vulnerability. If enemy
reserves are small and poorly positioned to extend the flank, the
vulnerability may be great. If the enemy reserves are large and in
position to extend the flank or counterattack an enveloping force, the
vulnerability is probably insignificant. The G2 might state it as: “The
enemy north flank is open. Available reserves are adequate to extend this
flank a distance of only about 3,000 m. poSit ions to extend the flank
have not been prepared. The enemy is vulnerable to a flank attack,”
Conversely, it might be stated as: “The enemy north flank is open.
However, available reserves are adequate either to extend this flank
beyond our zone, or to counterattack an enveloping force. Positions
suitable to block an attempted envelopment have been prepared as shown on
‘the enemy situation map.” In the first statement, the enemy’s
A-5
vulnerability to a flank attack is carried forward to conclusions of the
intelligence estimate. In the second statement, the open flank apparently
is not a vulnerability and is not carried any further. Another example:
If the guerrilla forces are poorly equipped with antitank means of all
types, the fact is stated under logistics, and the extent ‘to which this is
an exploitable vulnerability is discussed briefly. The intelligence
officer might state: “The guerrilla forces in our area are poorly equipped
with antitank means. They cannot effectively defend against armored
vehicles” The inability to defend against armored vehicles is carried
forward as a vulnerability to conclusions of the intelligence estimate.
Figure A-2 shows some examples of enemy peculiarities and weaknesses.
PERSONNEL
-- Replacement situation (shortages or overages, particularly in
specialists)
-- Morale less than excellent, or exceptionally high.
— Disproportionate number of very young or very old men.
-- High rate of sickness.
-- Percentage of authorized strength, if less than 80 percent.
INTELLIGENCE
-- Susceptibility to deception or neutralization of certain enemy
information collection agencies.
— Overdependence on one or more categories of information sources.
-- Ineffectiveness of enemy intelligence.
OPERATIONS
-- Habitual repetition of certain schemes of maneuver, or
unconventional patterns of operations.
-- Faulty organization of the terrain.
-- Faulty disposition of reserves.
-- Susceptibility to electronic countermeasures.
-- Inadequate troop training, especially in defense against nuclear
weapons or chemical agents.
-- Lack of adequate mobility.
Figure A-2. Example sof typical enemy peculiarities and weaknesses.
A-6
-- Inadequate air or artillery support, or nuclear weapon del ivery
systems.
-- Pronounced failure to disperse and dig in.
-- Habitual failure to attack certain types of targets.
LOGISTICS
-- Shortages or inadequacies of particular supplies and materiel,
including nuclear weapons.
-- Status of equipment, if less than 80 percent.
-- Large concentrations of supplies.
-- Location of vulnerable points and bottlenecks in the logistics
system or lines of communications.
-- Inability to resupply during action.
-- Failure to equip troops with protective masks or protective
clothing.
CIVIL-MILITARY OPERATIONS
-- Hostile attitude toward the civil populace, or of the civil
populace toward the enemy.
-- Inadequacies in the control of civil communications, to include
movement of civilians.
PERSONALITIES
— Peculiarities or weaknesses of the enemy commander, major
subordinate commanders, or principal staff officers as disclosed by
or deduced from their past performance, education, politics,
experience, or other basis.
Figure A-2. Examples of typical enemy peculiarities and weaknesses (continued).
ENEMY CAPABILITIES
Paragraph 4. List the enemy courses of action which tha enemy adopts
and which influences the accomplishment of the friendly mission, either
favorably or unfavorably. A properly stated enemy capability indicates
what the enemy can do, when and where the enemy can do it, and in what
strength. For example, “Attack (what) now (when) along our front (where)
with five motorized battalions supported by all available nuclear weapons,
artillery and air (strength). ” Another example: “Conduct harassing
operations (what) at any time (when) in our area (where) with about 200
guerrillas equipped only with small arms (strength).’”
A-7
The evidence considered in the analysis and discussion of enemy
capabilities includes characteristics of the AO and positive or negative
evidence of enemy activity, listed under recent and present significant
activities. A major obstacle across part of the friendly area is evidence
that attack elsewhere is more likely. Low ceilings and low visibility are
evidence that the enemy is not using all available aircraft. Open, flat
areas without any appreciable cover are evidence that the enemy does not
use guerrilla or infiltration forces.
In analyzing and discussing each enemy capability or appropriate
combination, the intelligence officer judges from the enemy point of view
the advantage or disadvantage of adopting the capability. In making this
judgment, the G2 or S2 also considers enemy doctrine and practices and the
ultimate results of adopting or rejecting the particular capability. For
example: “Employment of the unidentified tank division at TNOMYEH
deprives the enemy of the reserves needed to counterattack a penetration
by either of the two friendly divisions to our south. Commitment of this
tank division too early will result in the later defeat of the enemy.”
If there is no evidence of the enemy’s possible adoption of a
particular capability and the capability does not represent a major threat
to the accomplishment of the mission, the intelligence officer does not
judge it. For example, the enemy usually withdraws beyond our objective.
Ordinarily, such withdrawal is not a threat to the accomplishment of the
mission. If there is no evidence that the enemy withdraws, a statement
of conclusions is omitted. The intelligence officer states: “There is no
indication of withdrawal. ”
CONCLUSIONS
Paragraph 5. State the intelligence officer’s estimate of the--
"Total effects of the AO on friendly courses of action.
"Courses of action most likely to be adopted by the enemy,
including their relative probability of adoption.
"Effects of enemy vulnerabil ities that can be exploited.
For a defensive mission, conclusions identify the best defense areas
and the best AAs into the defense sector. For an offensive mission, the
conclusion describes the best AA to the objectives.
Determine the enemy probable courses of action by the previous
analysis and discussion of enemy capabilities. Consider how the enemy
views the vulnerabilities as indicated by doctrine, past experiences, and
the personality of the enemy commander. Consider previous enemy courses
of action selected under similar circumstances. The determination is
objective and not an unsubstantiated guess at what the enemy will do.
In determining the relative probability of adoption of enemy courses
of action, the intelligence officer avoids conclusions based on friendly
doctrine and practices. The officer considers the available evidence, to
A-8
include the enemy doctrine and practices, as well as positive or negative
enemy activity, If enemy activity is not definitive enough to justify
selection of the enemy’s most probable course of action, the officer
determines the most probable one based on the characteristics of the AO,
enemy doctrine, practices, and previous experiences.
In the statement of the courses of action most likely to be adopted by
the enemy, several capabilities are combined for brevity and clarity.
However, all of the enemy capabilities combined in one statement are
capable of being implemented at the same time. For example, the most
probable enemy course of action is to: “Attack to envelop our northern
flank, reinforced by corps reserve and using all available nuclear
weapons, artillery, and air support; and conduct harassing operations in
our rear areas with guerrillas and infiltrating forces. ”
If more than one enemy course of action is stated, they are listed in
the order of their probability of adoption.
An enemy vulnerability is any condition or circumstance of the enemy
situation or the AO which makes the enemy especially liable to damage,
deception, or defeat. Only those enemy weaknesses which are exploited are
considered. In studying the enemy peculiarities and weaknesses to
determine such vulnerabilities, the characteristics of the AO, all aspects
of the enemy situation, and the enemy’s doctrine and practices are
considered. Only actual vulnerabilities are presented. An open northern
flank which the enemy cannot, with available forces, extend or defend, is
a vulnerability. If, however, the enemy has reserves which readily extend
the flank to an impassable obstacle or counterattack to pin enveloping
troops against that obstacle, the open flank is mentioned as a possible
vulnerability, although the vulnerability may be eliminated by commitment
of the enemy reserves. However, the commitment of reserves creates
another vulnerability.
Each exploitable enemy vulnerability is listed as a brief statement of
the effect of the vulnerability rather than a repetition of the
peculiarity or weakness. For example: “Shortage of antitank means” is not
stated. Instead, the effect of that weakness is given by stating:
“Limited capability to oppose armored vehicles. ” If the enemy’s north
flank is vulnerable, it could be stated as: “’Enemy northern flank open to
envelopment subject to destruction of enemy reserves at . . .
In determining enemy vulnerabilities, the G2 or S2 considers the
feasibility of their exploitation and makes appropriate recommendations to
the G3 or S3. All enemy vulnerabilities are not exploited at the same
time. The exploitation of one vulnerability precludes the exploitation of
another vulnerability.
For example, the enemy is vulnerable to both a night penetration and a
daytime flank envelopment. The G3 or S3, in coordination with the G2 or
S2, recommends to the commander the priority of vulnerabilities to be
exploited. Based on the information in this appendix and in Chapter B,
Figures A-3 through A-5 show the formats for the annotated intelligence
estimate, sample intelligence estimate for a division, and an annotated
intelligence estimate for stability operations.
A-9
(Classification)
Headquarters
Place
Date, time, and zone
Msg Ref No
INTELLIGENCE ESTIMATE NO_
References: Maps, charts, or other documents.
Time Zone Used Throughout the Estimate:
(Short title identification)
1. MISSION. The restated mission determined by the commander.
2. AREA OF OPERATIONS. This paragraph discusses influence of the
battlefield environment in arriving at conclusions. It is based on the
facts and conclusions of IPB and the analysis of the battlefield area, if
one has been prepared. It may be a reference to an analysis of the
battlefield, if adequate coverage and discussion are contained therein.
a. Weather.
(1) Existing situation. Include light data and either a weather
forecast or climatic information, as appropriate. Use appendixes for
detailed information.
(2) Effect on enemy courses of action. Describe the effects of
weather on each broad course of action (such as attack or defend). Each
description concludes with a statement of whether the weather favors the
course of action. Among the courses of action, include use of chemical
agents, nuclear weapons, and special methods, techniques, equipment,
procedures, or forces.
(3) Effect on own courses of action. Describe in the same manner as
for (2) above, except that the estimate excludes the use of biological
agents.
b. Terrain.
(1) Existing situation. Use graphic representations, such as IPB
templates, where possible. Use annexes for detailed material. Include as
much information as necessary for an understanding of observation and fire,
concealment and cover, obstacles, key terrain features, and AAs. Include
effects of nuclear fires, enemy biological and chemical agents, and any
other pertinent considerations on each of these factors as appropriate.
(Classification)
Figure A-3. Annotated intelligence estimate.
A-10
(Classification)
(Short title identification)
(2) Effect on enemy courses of action. Describe in the same manner
as for the effects of weather in a(2) above. For defensive courses of
action, state the best defense area and the best AAs leading to it. For
attack courses of action, state the best AAs.
(3) Effect on own courses of action. Describe in the same manner
as for effects of weather in a(3) above.
c. Other Characteristics. The following additional characteristics
considered pertinent are included in separate subparagraphs: sociology,
politics, economics, psychology, and other factors. Other factors may
include such items as science and technology, materiel, transportation,
manpower, and hydrography. These factors are analyzed using the same
subheadings as weather and terrain.
3. ENEMY SITUATION. This paragraph gives information on the enemy which
will permit later development of enemy capabilities and vulnerabilities and
retire ment of these capabilities into a specific c urse of action and its
relat ve probability of adoption.
a Disposition. Reference may be made to over ays, enemy situation
maps, or previously publ ished documents.
b Composition. Summarize enemy OB that can influence accomplishment
of the mission. Reference may be made to previously published documents.
Special mention is made of units capable of EW, low-intensity operations,
and other special operations, as appropriate.
c. Strength. Enemy strength is listed as committed forces,
reinforcements, air assets, nuclear weapons, and chemical and biological
agents. The purpose of this listing is to assist in developing enemy
capabilities and vulnerabilities for use by the commander and staff in
selecting courses of action. The unit mission, location of the enemy,
enemy doctrine, and the level of command at which the estimate is being
prepared are factors to be considered.
(Classification)
Figure A-3. Annotated intelligence estimate (continued).
A-n
(Classification)
(Short title identification)
(1) Committed forces. List those enemy ground maneuver units
currently in contact and those ground maneuver units with which imminent
contact can be expected, regardless of the specific friendly course of
action implemented. Designation of enemy forces as committed forces
depends on disposition, location, controlling headquarters and doctrine.
The intelligence officer usually accounts for committed forces based on
the size unit doctrinally used to oppose the friendly unit. Generally,
enemy units are counted in terms of units two echelons below the friendly
unit's size (for example, a brigade S2 normally considers committed forces
in terms of companies; a division G2, in terms of battalions; and a corps
G2, in terms of regiments). If there is doubt whether a unit is a
committed force or a reinforcement, it is considered a reinforcement.
This attributes to the enemy the maximum capability to reinforce forces to
oppose a given friendly course of action.
(2) Reinforcements. Include designation and location.
Reinforcements are those enemy maneuver units that may or may not be
employed against us, depending on our choice of a specific course of
action and enemy plans. Reinforcements are enemy units not committed in
or out of the friendly sector, but which can react to the friendly course
of action, subject to time and distance considerations, in time to
influence the accomplishment of the mission. Imminent contact is not
expected. Disposition, location, level of control, or other factors at
the time of the estimate are considered in determining which enemy forces
are reinforcements.
(3) Air. List the number of enemy aircraft by type within
operational radius. Include the number of possible sorties per day by
type of aircraft, if known.
(4) Nuclear weapons and chemical and biological agents.
Estimate, as appropriate, the number, type, yield, and delivery means of
enemy nuclear weapons and chemical and biological munitions or agents
available to the enemy.
d. Recent and Present Significant Activities. List selected items of
information to provide bases for analyses to determine relative
probability of adoption of specific courses of action and enemy
vulnerabil ities. Enemy failures to take expected actions are listed, as
well as positive information.
(Classification)
Figure A-3. Annotated intelligence estimate (continued).
A-12
(Classification)
(Short title identification)
e. Peculiarities and Weaknesses. Based on knowledge of enemy
tactical doctrine, practices, the principles of war, the AO, and the enemy
situation previously described and discussed, list peculiarities and
weaknesses, and briefly describe each, indicating the extent to which they
may be vulnerable and how they influence possible friendly courses of
action. The items listed are grouped under the headings indicated below.
Only pertinent headings are used.
(1) Personnel. An estimate of strength usually is included if less
than 80 percent of authorized strength. Status of morale is included, if
known.
(2) Intelligence. An estimate of enemy intell igence success,
ineffectiveness, and susceptibility to deception and detection is usual ly
included.
(3) Operations. An estimate of combat effecti veness is usually
included if less than excellent.
(4) Logistics. An estimate of the enemy’s capability to support
their forces logistically is included if there are apparent weaknesses.
(5) Civil-military operations. An estimate of the attitudes of the
enemy and the civilian populace and the status of food supply, medical
facilities, communications, and other critical resources is usually
included.
(6) Personalities. An estimate of the capabilities and or
weaknesses of the enemy commander and principal staff officers usually is
included.
4. ENEMY CAPABILITIES. Based on all the previous information and
analyses, develop and list enemy capabilities. The listing provides a
basis for analyzing the available information to arrive at those
capabilities the enemy can adopt as specific courses of action and their
relative probability of adoption.
a. Enumeration. State what, when, where, and in what strength for
each capability.
(Classification)
Figure A-3. Annotated intelligence estimate (continued).
A-13
(Classification)
(Short title identification)
b. Analysis and Discussion. To provide a basis for conclusions of
enemy capabilities and their relative probability of adoption, each
capability, or appropriate combination thereof, is discussed in a separate
subparagraph. Consideration of enemy deception measures is included. All
the pertinent previous information and conclusions are tabulated as either
supporting or rejecting the adoption of the capability. After listing all
the evidence, each capability is judged from the enemy point of view of
whether the adoption of the capability is advantageous to the enemy. Such
judgments need not be made if the conclusion is obvious or if there is no
evidence that the enemy will adopt the capability, except when the
capability is one that will make the accomplishment of the friendly
mission highly doubtful or impossible. This exception is to focus
attention on dangerous threats.
5. CONCLUSIONS. Based on all the previous information and analyses,
conclusions are stated concerning the total effects of the AO on friendly
courses of action; the courses of action most likely to be adopted by the
enemy, including their relative probability of adoption; and the effects
of enemy vulnerabilities that can be exploited. These conditions assist
in the selection of a friendly course of action.
a. Effects of Intelligence Consideration on Operations. Indicate
whether the mission set forth in paragraph 1, above, can be supported from
the intelligence standpoint. Indicate which courses of action can best be
supported.
b. Effects of the AO on Own Courses of Action. For attack courses of
action, indicate the best AAs. For defensive courses of action, indicate
the best defense areas and the best AAs leading to and into the defense
areas. (This subparagraph is omitted if the discussion of the effects of
the area on own courses of action in paragraph 2 has been omitted because
of the availability of a current analysis of the AO.)
c. Probable Enemy Courses of Action. List courses of action in order
of relative probability of adoption. A listed course of action may
include several subordinate courses of action that can be executed
concurrently. Usually, no more than two or three courses of action, in
order of probability of adoption, can be justified by the available
evidence.
(Classification)
Figure A-3. Annotated intelligence estimate (continued).
A-14
(Classification)
(Short title identification)
d. Enemy Vulnerabil ities. List the effects of peculiarities and
weaknesses that result in vulnerabilities that are exploitable at own,
higher, or lower levels of command. The order in listing these
vulnerabil ities has no significance.
Isl (Designation of staff officer)
OFFICIAL:
G2’s Signature Block
Annexes (as required)
Distribution:
Figure A-3. Annotated intelligence estimate (continued).
A-15
(Classification)
Copy — of --- Copies
G2 Section, 52d Division (Mech)
GLENVILLE (NF3277), EASTLAND
2308302 June 19
Msg Ref No.
INTELLIGENCE EST MATE NO 20
Reference: Map, series East and, sheets Delta through Kilo, edition 2,
1:50,000 Time Zon e Used Throu ghout the Estimate: Zulu.
1. MISSION. 52d Div defends along Dry Creek and prepares to attack on
order.
2. AREA OF OPERATIONS.
a. Weather.
(1)
Existing
situation.
Weather
for the
period 23
to
28 June
#ill be rainy
and cool
1, gradually
warming and clearing
as a
high pressu
system moves through
the AO from
the south
Temperatures from
40 to
65°F . Visibility will
range from
16 to 25
kilometers,
except
during
precipitation
and in morning fog
in low drainage
areas
Surface winds
from the south at 8 to 10 knots.
BM-
BM-
EE-
EE-
Moon-
Moon-
Date
NT
CT
CT
NT
rise
set
23 June
0331
0419
2029
2130
1746
0125
25 June
0339
0422
2025
2124
1907
0214
27 June
0344
0425
2022
2118
2001
0518
28 June
0349
0428
2018
2112
2022
0820
(2) Effects on enemy courses of action:
(a) Precipitation will not hinder cross country movement
except in the low drainage areas of Minertown.
(b) Southerly winds will not affect enemy employment of NBC.
(c) Low visibility during precipitation and morning fog will
favor enemy attack.
(3) Effects on friendly courses of action:
(Classification)
Figure A-4. Sample division intelligence estimate.
A-16
(Classification)
(a) Precipitation will not hinder cross country movement
except in the low drainage areas of Minertown.
(b) Southerly wind direction will not affect friendly use of
chemical or nuclear weapons.
(c) Low visibility during precipitation and morning fog will
not favor friendly defense.
b. Terrain.
(1) Existing si tuation.
(a) Cover and concealment. Wooded areas around Midway offer
good concealment. Numer ous ravines in drainage areas of Minertown offer
limited cover and concealment.
(b) Observation and fire. There are good observation points
along bluffs above Gringo River. Fields of fire are excellent throughout
plains areas north of Mud Creek but limited moderately in populated and
vegetated areas near Glenville.
(c) Obstacles.
1
Swift
River (fordable
1 km
east
of Glenville).
2
Bluffs
above Gringo
River.
3
City
of Glenville.
Routes
around
city are passable;
routes through city impassable.
(d) Key terrain. Hill mass Jackson and Hill 333.
(e) AAs.
1 Available to the enemy into our sector:
a AA 1 is from Largo through gap around the
northeast end of HILL 702, 34 km southwest to Minertown and south to Dry
Creek.
b AA 2 is from Largo southeast through Midway to
river crossing east of Glenville.
(Classification)
Figure A-4. Sample division intelligence estimate (continued).
A-17
(Classification)
2 AA available for US movament into the enemy’s area is
generally the same as those I isted for enemy into our sector.
(2) Effect on enemy courses of action. Terrain favors the enemy
attack using AA 1.
(3) Effect on friendly courses of action. Terrain favors our
defense of the srea around Dry Creek.
c. Other Characteristics.
(1) Existing situation. Local nationals throughout the area
favor friendly military operations. Large numbers of refugees can be
expected to pass through friendly lines.
(2) Effect on enemy courses of action. The enemy can be
expected to insert infiltrators as refugees.
(3) Effect on friendly courses of action. Refugees can be
expected to provide valuable inteliigence.
3. ENEMY SITUATION.
a. Disposition. Annex A, Situation Overlay.
b. Composition. Enemy forces opposing 52d Div consist of elements of
the 4th Combined Arms Army.
(1) Identified units are--
(a) 10th MRD consisting of—
-27th MRR.
-30th MRR.
-31st MRR.
— 121st Tk Regt (unlocated).
(b) 19th Mech Div consisting of—
-23d MRR.
— 37th Tk Regt.
(2) Unidentified units are: 2 x U/l MRR of 19th MRD.
(Classification)
Figure A-4. Sample division intelligence estimate (Continued).
A-18
(Classification)
c. Strength.
(1) Committed forces. 52d Div (Mech) is opposed immediately by
four mechanized battalions and one tank battalion. These units are
supported by normal divisional and regimental artillery groups.
(2) Reinforcements. Reinforcements available to the enemy for
commitment in our zone are a total of five MRB and four tank battalions
from the 27th MRR, 121st Tk Regt, and the second-echelon battalions of the
30th and 31st MRRs and the 37th Tk Regt. Also, the 23d MRR can totally
reinforce within 8 hours from start of movement.
(3) Air. Enemy is supported by the 3d Air Army consisting of
unidentified numbers of fighter-bomber aircraft, ground attack aircraft,
and reconnaissance aircraft. Air parity currently exists with either
force capable of obtaining air superiority for limited periods of time.
Up to now enemy has used a maximum of 60 fighter-bomber sorties in a
12-hour period.
(4) Nuclear. No estimate of the enemy’s nuclear support for the
next 30 days is available. Enemy currently has 152mm Gun-Hows with
nuclear rounds and SSMS which can del iver rounds of 10-50 kt yield within
range of our division.
d. Recent and Present Significant Activities.
(1) Air reconnaissance and photo reports indicate increased enemy
movement along axis Bravo to Limo. Movement indicates reinforcement of
forward element of 4th CAA.
(2) Enemy’s aerial recon and tactical air flights have increased
in the last 36 hours, particularly along the I ine of contact.
(3) For the past 36 hours, volume of vehicular traffic has
increased in southerly direction.
(4) Artillery fire from the enemy has become more intensive in
the last 24 hours.
(5) Reliable source reports large tracked, amphibious vehicles
mov ng into area vicinity Hill 805.
(Classification)
Figure A-4. Sample division intelligence estimate (continued).
A-19
(Classification)
(6) Enemy has begun to employ smoke along the forward slope of
Hill 702.
e. Peculiarities and Weaknesses.
(1) Personnel. Enemy units are currently estimated to be at 85
to 90 percent authorized strength. Morale is high, although replacements
may not be highly trained.
(2) Intelligence. Enemy stresses communications security and
subordinate units of the 4th CAA have recently initiated intensive radio
security and procedures training.
(3) Operations.
(a) Enemy is susceptible to mine warfare and antitank
weapons.
(b) Enemy has trained heavily on attack formations and bas
been told offensive action is the only way to victory.
(c) Enemy is vulnerable to nuclear weapons due to massed
forces and canalization by further advancement.
(4) Logistics. Supplies are adequate for the enemy’s conduct of
either the offense or defense. The enemy had previously stockpiled
supplies wel I forward in division areas.
(5) Personal ities. GD Masonski, CG of the 10th MRD, is an
advocate of penetration type offense on a narrow front with subsequent
widening of the gaps to split enemy forces.
4. ENEMY CAPABILITIES.
a. Enumeration:
(1) Attack at any time along AA 1 with four MRBs and one tank
battalion supported by normal d visional and regimental artillery groups.
(2) Attack at any time along AA 2 with four MRBs and one tank
battalion supported by normal divisional and regimental artillery groups.
(Classification)
Figure A-4. Sample division intelligence estimate (continued).
A-20
(Classification)
(3) Defend at any time with forces in contact supported by all
available divisional and regimental artillery groups.
(4) Reinforce the attack or defense with all or part of the
following units at the places and times indicated:
UNIT
PLACE
TIME
(a)
30th MRR(-)
AA2
immediately
(b)
31st MRR(-)
AA 1
immediately
(c)
37th Tk Regt
(-)
AA 1
immediately
(d)
27th MRR
AA 1
or 2
2 hr after
start of
movement
(e)
23d MRR
vie Little
8 hr after
start of
movement
(f)
121st Tk
Regt
Unlocated
Unknown
(g)
U/l MRR of
19th MRD
vie Bravo
9 hr after
start of
movement
(5) Delay in successive positions to the east of Little.
(6) Employ chemical agents within our sector at any time.
(7) Employ nuclear weapons of a 0.5-50 kt yield with delivery by
artillery or SSM.
(8) Employ guerrilla forces in our rear area either alone or in
communication with the capabilities enumerated below.
(9) The enemy can attack our area with an undetermined number of
fighter, ground attack, and bomb sorties daily. The maximum number of
daily sorties mounted in our area has been 60.
I _
(Classification)
Figure A-4. Sample division intelligence estimate (continued).
A-21
(Classification)
b. Analysis and Discussion.
(1) Attack along AA 1.
(a) The following indicate adoption of this capability:
1 Uses a good AA.
2 The enemy is massing mechanized elements, tanks,
artillery and logistic support along this avenue.
3 Forward elements disposed on a relatively narrow
front.
4 Extensive artillery preparation along approach.
(b) The scant cover presented along this AA is a limiting
factor but does not preclude adoption of this capability.
(2) Attack along AA 2.
(a) The following indicate adoption of this capability:
1 The enemy is massing mechanized elements, tanks,
artillery and logistic support along this avenue.
2 Forward elements disposed on a relatively narrow
front.
3 Extensive artillery preparation along this avenue.
(b) The following indicate rejection of this capability:
1 This AA accommodates only one deployed regiment and
offers limited cover and concealment.
2 The limited obstacle presented by Glenville.
(3) Defend. The following indicate rejection of this capability:
(a) The enemy is massing forces along the line of contact.
(b) Enemy has followed known doctrine for attack.
(Classification)
Figure A-4. Sampie division intelligence estimate (continued).
A-22
(Classification)
(c) Terrain favors attack.
(4) Reinforce. The following indicates adoption of this
capability:
(a) Movement of additional troops toward the front.
(b) New units identified in the combat zone.
(c) Forward logistical buildup.
(5) Delay. There are no indications of the enemy’s adoption of
this capability.
(6) Employ chemical agents. There is no indication the enemy
will employ chemical agents other than smoke.
(7) Employ nuclear weapons. There is no indication the enemy
will employ nuclear weapons.
(8) Employ guerrilla forces. The following indicates adoption of
this capability:
(a) Doctrine calls for use of guerrilla force.
(b) Use would enhance enemy advance by creating panic and
confusion.
(9) Air attack. Indications are that enemy will continue to
employ this capability as referenced in paragraph (9) above.
5. CONCLUSIONS.
a. Intelligence. Available intelligence indicates that the division
can accomplish its mission. Intelligence supports adoption of the
division course of action.
b. Weather and Terrain. The weather and terrain favors our defense.
The beat defensive area is the high ground east of Dry Creek. The best AA
into our defensive sector is AA 1.
c. Probable Enemy Courses of Action.
(Classification)
Figure A-4. Sample division intelligence estimate (continued).
A-23
(Classification)
(1) Attack with forces in contact supported by air and artillery
with the main attack of one mechanized regiment along AA 1. Will
reinforce w th elements as indicated in para 4a(4).
(2) Conduct secondary attack with forces in contact supported by
air and arti llery with one mechanized regiment along AA 2.
(3) Employ guerrilla or special forces in our rear areas in
conjunction with the above courses of action.
d. Enemy Vulnerabilities.
(1) The enemy is vulnerable to counterattack due to slowness to
exploit potential penetrations.
(2) Vulnerable to nuclear attack due to massing of troops and
concentrated logistics depots.
(3) Mine warfare will be effective against mechanized elements.
KROOK
BG
OFFICIAL:
Isl Bagger
BAGGER
GS
Annex: A--Situati on Overlay (omitted)
Distribution: A
(Classification)
Figure A-4. Sample division intelligence estimate (continued).
A-24
(Classification)
Copy --- of --- Copies
Preparing Staff Element
Organization
Location
Date-Time Group
Msg Ref No
INTELLIGENCE ESTIMATE NO
References: maps, charts, or other documents.
Time Zone Used Throughout the Estimate: Zulu
1. MISSION. (States the current or proposed mission of the force
designated for stability operations.)
2. THE AREA OF OPERATIONS. (This paragraph discusses characteristics of
the host country, the area, and their probable effect upon both insurgent
and government courses of act ion.)
a. Geography. (Includes climate and topography.)
(1) Existing situation.
(2) Effect on insurgent courses of action.
(3) Effect on government courses of action.
b. Politics. (Includes governmental organization, political parties,
and interest groups.)
(1) Existing situation.
(2) Effect on insurgent courses of action.
(3) Effect on government courses of action.
c. Economy. (Includes private enterprise and publ ic facilities.)
(1) Existing situation.
(2) Effect on insurgent courses of action.
(3) Effect on government courses of action.
(Classification)
Figure A-5. Annotated intelligence estimate for stability operations.
A-25
(Classification)
d. Sociology (Includes minority groups and social programs.)
(1) Existing situation.
(2) Effect on insurgent courses of action.
(3) Effect on government courses of action.
e. Psychology. (Includes behavior patterns and motivating factors.)
(1) Existing situation.
(2) Effect on insurgent courses of action.
(3) Effect on government courses of action.
3. THE INSURGENT SITUATION. (This paragraph discusses the insurgent
organization and its activities.)
a. Organization and Leadership. (Includes composition.)
(1) Nonmilitary. (Includes the underground.)
(2) Military. (Includes all insurgent armed elements.)
b. Strength and Disposition.
(1) Nonmilitary.
(2) Military.
c. Recent and Present Significant Activities.
(1) Nonviolent action. (Includes political, economic,
sociological, and psychological action.)
(2) Terrorist action. (Includes murder, torture, extortion,
kidnapp ing, and sabotage.)
(3) Guerrilla operations. (Includes harassment, destruction,
i nterdi ction, and dispersion.)
(Classification)
Figure A-5. Annotated Intelligence estimate for stability operations [continued).
A-26
(Classification)
(4) Conventional tactical operations. (Includes attack, defense,
clay, and withdrawal.)
d. Strengths and Weaknesses.
(1) Recruitment and retention.
(2) Intelligence and security.
(3) Organization and training.
(4) Finance and logistics.
(5) Communications.
4. INSURGENT CAPABILITIES. (This paragraph lists current insurgent
capabilities and discusses them in regard to probability of adoption.)
a. Enumeration. (Includes what, where, when, and how for each
capability.)
(1) Basic capabilities.
(a) Nonviolent action.
(b) Terrorist action.
(c) Guerrilla operations.
(d) Conventional tactical operations.
(e) Employment of chemical, biological, or nuclear weapons.
(2 Supporting capabilities.
(a) Intelligence and security.
(b) Recruitment and retention.
(c) Organization and training.
(d) Finance and logistics.
(Classification)
Figure A-5. Annotated intelligence estimate for stability operations (continued).
A-27
(Classification)
(e) Reinforcement capabilities.
b. Analysis and Discussion. (Includes all evidence supporting or
rejecting the adoption of each capability.)
5 . CONCLUSIONS. (This paragraph draws conclusions from the content of
:he preceding paragraphs and furnishes a basis for selection of courses of
action to accomplish the assigned miss ion.)
a. Effects of the Operational Environment. (States the total effect
of the AO upon courses of action.)
b. Probable Insurgent Courses of Action. (Lists probable insurgent
courses of action in order of relative probability of adoption.)
c. Insurgent Vulnerabilities, (Lists exploitable insurgent
vulnerabilities.)
/ s / _
G2 or S2
(Commander if distributed
outside headquarters)
ANNEXES:
Distribution: (If distributed only.)
Authentication: (G2 or S2 authenticates if commander signs estimate.)
(Classification)
Figure A-5. Annotated intelligence estimate for stability operations (continued).
A-28
INTELLIGENCE ANNEX TO THE OPORD OR OPLAN
The intelligence annex disseminates information about enemy forces
which is essential to the conduct of the operation and to give any other
necessary intelligence orders or guidance for the operation(s) in
question. It also serves as a medium for instructing subordinate
commanders to acquire information necessary for the conduct of the
operation but which can only be obtained immediately before or when the
operation itself has begun. The intelligence annex is not a substitute
for an intelligence collection plan; rather it is a way to communicate the
taskings and requests of the collection plan.
The intelligence annex is a formal intelligence tasking document that
accompanies an OPLAN or OPORD. It should be as brief as possible
consistent with clarity. Its first paragraph is a summary of the enemy
situation required to understand the OPLAN or OPORD and refers to
annotated maps, enemy situation overlays, or current intelligence reports.
Subsequent paragraphs contain specific collection requirements and
instructions. SOP information should not be repeated in the intelligence
annex. Figures A-6 and A-7 show a general intelligence annex format and
division intelligence annex example.
(Classification)
(Change from oral orders, if any)
Copy no _ of _Copies
Issuing headquarters
Place of issue (may be in code)
Date-time group of signature
Message reference number
ANNEX (INTELLIGENCE) to OPERATION ORDER NO _.
References: Maps, charts, and other relevant documents.
Time Zone Used Throughout the Order: Zulu
1. SUMMARY OF ENEMY SITUATION. Information about enemy forces essential
in implementing the operation plan. When the amount of detail makes it
appropriate, a brief summary and reference to the appropriate intelligence
document, or appendix to the annex, may be used. Reference to documents
not included in the annex should not be made when they ara not available
to all recipients of the annex.
(Classification)
Figure A-6. Intelligence annex format.
A-29
(Classification)
2. INTELLIGENCE REQUIREMENTS. List each PIR in a separate subparagraph.
If a priority has been assigned to the PIR list in order, so state. In a
final subparagraph, list IRs, if any. If an intelligence annex is not
prepared or is distributed separately from the basic order, PIR should be
listed in the coordinating instructions subparagraph of the OPORD.
3. INTELLIGENCE ACQUISITION TASKS.
a. Orders to Subordinate and Attached Units. List, by unit, in
separate numbered subparagraph, detailed instructions for reports required
by the issuing headquarters. Units are listed in the same order as they
are I isted in the OPORD.
b. Requests to Higher, Adjacent, and Cooperating Units. List in a
separate numbered subparagraph requests for information from units not
organic or attached.
4. MEASURES FOR HANDLING PERSONNEL, DOCUMENTS, AND MATERIEL. This
paragraph contains instructions about the operation that are not contained
in SOP or that modify or amplify SOP for the current operation. Examples
include--
a. EPWs, Deserters, Repatriates, Inhabitants, and Other Persons,
Special handling and segregation instructions. Location of EPW collection
point as provided by the provost marshal.
b. Captured Documents. Instructions for handling and processing of
captured documents from time of capture to receipt by specified
intelligence personnel
c. Captured Materiel. Designation of items or categories of enemy
materiel for examination, and specific instructions for their processing
and disposition.
5. DOCUMENTS OR EQUIPMENT REQUIRED. This paragraph lists, in each
category, the conditions under which certain documents or equipment
required by or allocated to units can be obtained or requested. Items may
include air photographs and maps.
6. COUNTERINTELLIGENCE.
a. This paragraph is covered largely by SOP. Many special
operational instructions having Cl aspects are I isted in the OPORD or in
other annexes.
(Classification)
Figure A-6. Intelligence annex format (continued).
A-30
(Classification)
b. Certain instructions and procedures on the conduct of special
personnel in the operation may require limited dissemination on a
need-to-know basis; therefore, a special Cl measures appendix may be
prepared for a limited and specified number of addresses.
7. REPORTS AND DISTRIBUTION. This paragraph may be covered largely by
SOP . It stipulates the conditions (for example, dates, number of copies,
issue) regulating the issue of intelligence reports to the originating
command for the duration of the operation. Any or all of the following
items may be covered in this paragraph:
a. Period to be covered by routine reports and distribution.
b. Routine and special reports that differ from SOP required from
subordinate units.
c. Periodic or special conferences of inte lligence officers.
d. Distribution of special intelligence studies, such as defense
overprints, photointelligence reports, and OB overlays.
em Special intelligence liaison, when indicated.
8. MISCELLANEOUS INSTRUCTIONS (if required). List here, under separate
subparagraphs, necessary items that are not covered above or in SOPS, or
which require action different from that detailed in SOPS.
Acknowledge
Last name of commander
Rank
Authentication:
Appendixes:
Distribution:
(Classification)
Figure A-6. Intelligence annex format (continued).
A-31
(Classification)
(Change from oral orders, if any)
Copy 4 of 5 Copies
20th Inf Div
Zelle (4671), Buttano
1019OOZ Sep 45
BQ 13
Annex A (Intelligence) to Operations Order 24
Reference: Map, Buttano, Edition 2, 1:50,000 sheets 204 (Zelle-Pagt).
Zulu Time
1 0 SUMMARY OF ENEMY SITUATION. See INTSUM, this HQ, 1018OOZ
September, and Appendix 1, Situation Overlay.
2. INTELLIGENCE REQUIREMENTS.
a. PIR.
(1) Will enemy reinforce the forces along the Flood River before
the time of attack? If so, when, where, and with what forces? Special
attention to the mechanized regiment and the medium tank regiment in
vicinity of Burg.
(2) Will enemy employ nuclear weapons against us? If so, when,
where, how many, of what yields, and by what delivery means?
b. IR.
(1) Will enemy continue to defend in the present position? if
so, how will forces on the ground be organized, and with what troops?
Special attention to locations and activities of reserves and
vulnerability to nuclear attack.
(2) Will enemy attack prior to 1105OOZ September? If so, when,
where, and in what strength? Special attention to the axis Hill 536--HMI
524-CR9841.
(3) Will enemy use CB agents? If so, what agents, when, how, and
where?
(Classification)
Figure A-7. Sample of a division intelligence annex.
A-32
(CLASSIFICATION)
INTELLIGENCE ACQUISITION TASKS.
a. Orders to Attached and Subordinate Units.
(1) 1st Bale.
(2) 2d Bale.
(a) Report as obtained.
1 Status of construction of defensive positions and
minef ields on and to the east of the Flood River.
2 Location and size of ammunition storage sites and
I ocat ion. size, and content of engineer equipment parks.
3 Clearing of lanes through obstacles within enemy
position n division zone.
4 Number, size, and composition of enemy patrols, and
time they were observed.
5 Activity and size of units blocking our patrolling in
forward areas.
6 The interception of enemy patrols equipped for CB
activity.
7 The presence of enemy troops carrying protective masks
or wearing protective clothing.
(b) Report as obtained. Negative reports by 1104OOZ
September.
1 Activity in medium tank regiment (-) and tank battalion
assembly area in vicinity of Burg.
2 Location and activity of mechanized regiment in
vicinity of Burg.
(3) 3d Bale.
(a) Report as obtained--
(Classif ication)
Figure A-7. Sample of a division intelligence annex (continued)
A-33
(Classification)
1 Activity of mechanized battalion north and east of
CR9847.
2 Activity of mechanized battalion on Hill 503.
3 Status of construction of defensive positions and
ninefields on and to the east of Flood River.
4 Location and size of ammunition storage sites and
location, size, and content of engineer equipment parks.
5 Clearing of lanes through obstacles within enemy
position in division zone.
6 Number, size, and composition of enemy patrols and ime
they were observed or contacted.
7 Activity and size of units blocking our patrolling n
forward areas.
8 The interception of enemy patrols equipped for CB
activity.
9 The presence of enemy troops carrying protective masks
or wearing protective clothing.
(b) Report as obtained-Negative reports by 1104OOZ
September.
1 Activity in medium tank regiment (-) and tank battalion
assembly area in vicinity of Burg.
2 Location and activity of mechanized regiment in
vicinity of Burg.
(4) 1/21 Cav report as obtained—
(a) Activity of mechanized battalion on Hill 503.
(b) Status of construction of defensive positions and
minefield on and to the east of the Flood River.
(c) Location and size of ammunition storage sites and
location, size, and content of engineer equipment parks.
(Classification)
Figure A-7. Sample of a division intelligence annex (continued).
A-34
(Classification)
(d) Clearing of lanes through obstacles within enemy
position in division zone.
(e) Number, size, and composition of enemy patrols, and time
they were observed.
(f) Activity and size of units blocking our patrolling in
forward areas.
(g) The interception of enemy patrols equipped for CB
activity.
(h) The presence of enemy troops carrying protective masks or
wearing protective clothing.
(5) Div Arty.
(a) Report as obtained--
1 Status of construction of defensive positions and
minefield on and to the east of Flood River.
2 Clearing of lanes through obstacles within enemy
position in division zone.
3 Number, size, and composition of enemy patrols, and
time they were observed or contacted.
4 Activity and size of units blocking our patrolling in
forward areas.
5 The interception of enemy patrols equipped for CB
activity.
(b) Report as obtained--Negative reports by 110400Z
September. Locations of artillery positions, including number of weapons,
caliber, and state of preparation of position.
(6) 20 Avn.
(a) Report as obtained--
1 Activity of mechanized battalion north and east of
CR9847.
Classification
Figure A-7. Sample of a division Intelligence annex (continued).
A-35
(Classification)
2 Activity of mechanized battalion on Hill 503.
3 Location, size, and type of unit in vicinity of Hill
536 (north of Burg) .
4 Status of construction of defensive positions and
ninefieids on and to the east of Flood River.
5 Location and size of ammunition sites, location, size,
and content of engineer equipment parks.
6 Preparation of emplacements suitable for, and presence
of equipment appropriate to, atomic demolition munitions (ADM).
7 The interception of enemy patrols equipped for CB
activity.
(b) Report as obtained--Negative reports by 1104OOZ
September.
1 Movement on the following roads:
a North on Highway 25.
b West on Highway 2.
c West on Highway 4.
2 Activity in medium tank regiment (-) and tank battalion
assembly area in vicinity of Burg.
3 Location and activity of mechanized regiment in
vicinity of Burg.
4 Location of artillery positions, including number of
weapons, ca i ber, and state of preparation of positions.
(7) 20 Engr report as obtained--
(a) Status of construction of defensive positions and
minefi elds on and to the east of Flood River.
(b) The interception of enemy patrols equipped for CB
a c t i v ty .
(Classification)
Figure A-7. Sample of a division intelligence annex (continued).
A-36
(Classification)
b. Requests to Higher, Adjacent, and Cooperating Units.
(1) 1st Corps is requested to provide:
(a) As obtained--
1 Location, size, and type of unit in vicinity of Hill
536 (north of Burg).
2 Number, types, direction of movement, and time of
movement of air or surface vehicular traffic within the division zone,
with special attention to Highway 2.
3 Troop concentrations, including types of vehicles, east
of Highway 25 within the divisional area of interest.
4 Evidence of field fortifications and troop
concentrations along the following lines:
a Hill 503-CR9847.
b Hill 518-Hill 536-Hill 499.
5 Location and size of ammunition storage sites and
locations, size, and content of engineer equipment parks.
6 Instances of heavily guarded vehicular movement.
Special attention to Highway 2 from Zilch to Burg.
7 Areas under unusual security restrictions in the
divisional area of interest.
8 Presence of special security troop units in any area
east of Highway 25.
9 Any location in the divisional area of interest from
which civilians have been evacuated.
1 0 Launcher sites for guided missiles or rockets within
divisional area of interest.
J_1 Preparation of emplacements suitable for, and presence
of equipment appropriate to, ADM.
(Classification)
Figure A-7. Sample of a division intelligence annex (continued).
A-37
(Classification)
12 The interception of enemy patrols equipped for CB
activity.
JL3 All CB supply movement and dumping in zone.
JA The presence of enemy troops carrying protective masks
or wearing protective clothing.
(b) As obtained—Negative reports by 1104OOZ September.
1 Movement on the following roads:
a North on Highway 25.
b West on Highway 2.
c West on Highway 4.
2 Activity in medium tank regiment (-) and tank battalion
assembly area in vicinity of Burg.
3 Location and activity of mechanized regiment in
vicinity of Burg.
4, Location and activity of mechanized regiment southwest
of CR9944.
5 Locations of artillery positions, including number of
weapons, caliber and state of preparation of positions.
6 Command posts, supply points, and medical facilities
east of Highway 25.
(2) 18 Inf Div is requested to provide—
(a) As obtained —
1 Troop concentrations, including types of vehicles, east
of Highway 25 within the divisional area of interest.
2 Instances of heavily guarded vehicular movement;
special attention to Highway 2 from Zilch to Burg.
(Classification)
Figure A-7. Sample of a division intelligence annex (continued).
A-38
(Classification)
3 Areas under unusual security restrictions in the
divisional area of interest.
4 Presence of special security troop units in any area
east of Highway 25.
5 Any location in the divisional area of interest from
which civilians have been evacuated.
6 Launcher sites for guided missiles or rockets within
divisional area of interest.
7 Locations of heavy artillery positions, including
number of weapons, caliber, and state of preparation of positions.
8 Preparation of emplacements suitable for, and presence
of equipment appropriate to, atomic demolition munitions (ADM).
9 The interception of enemy patrols equipped for chemical
biological (CB) activity.
jLD All CB supply movement and dumping in zone.
1_LThe presence of enemy troops carrying protective masks
or wearing protective clothing.
(b) As obtained—Negative reports by 1104OOZ September.
1 Movement on the following roads:
a North on Highway 25.
b West on Highway 2.
c West on Highway 4.
2 Location and activity of mechanized regiment in
vicinity of Burg.
(3) 52 Mech Inf Div is requested to provide as obtained —
(a) Troop concentrations, including types of vehicles, east
of Highway 25 within the divisional area of interest.
(Classification)
Figure A-7. Sample of a division intelligence annex (continued).
A-39
(Classification)
(b) Instances of heavily guarded vehicular movement, special
attention to Highway 2 from Zilch to Burg.
(c) Areas under unusual security restrictions in the
divisional area of interest.
(d) Presence of special security troop units in any area east
of Highway 25.
(e) Any location in the divisional area of interest from
which civilians have been evacuated.
(f) Launcher sites for guided missiles or rockets within
divisional area of interest.
(g) Locations of heavy artillery positions, including number
of weapons, caliber, and state of preparation of positions.
(h) Preparation of emplacements suitable for, and presence of
equipment appropriate to, ADM.
(i) The interception of enemy patrols equipped for CB
activity.
(j) All CB supply movement and dumping in zone.
(k) The presence of enemy troops carrying protective masks or
wearing protective clothing.
(4) Supporting Ml units provide information obtainable from
SIGINT and ESM and will respond to specific tasking as described in
separate instructions.
4. MEASURES FOR HANDLING PERSONNEL, DOCUMENTS, AND MATERIEL (see division
SOP) .
5. DOCUMENTS AND EQUIPMENT REQUIRED.
a. Maps. SOP distribution of map, Buttano, 1:50,000, Zelle-Pagt.
b. Photographic. Following aerial photographs will be furnished:
(Classification)
Figure A-7. Sample of a division intelligence annex (continued).
A-40
(Classification)
(1) Basic cover of division zone (1:10,000 approximate), six
copies of each brigade and division artillery; one copy each tank
battalion, mechanized infantry battalion, 1/21 Cav, division engineer,
aviation battalion or group, and division signal officer.
(2) Annotated air photographs distributed automatically, as
available.
6. COUNTERINTELLIGENCE.
a. Appendix 2, Cl.
b. All units coordinate use of Army aircraft through division
tactical operations center (DTOC) to minimize number of aircraft in air
over division zone prior to attack.
7. REPORTS AND DISTRIBUTION. Effective 1108OOZ September units will
submit INTSUM at 0800, 1200, 1600, 2000, 2400, and 0400 hours daily in
lieu of times prescribed in division SOP.
8. MISCELLANEOUS INSTRUCTIONS (as required),
None.
Acknowledge.
POWERS
MG
Append xes: 1 --S ituation Overlay
2--c
Distribution: Same as OPORD _
OFFICIAL:
/s/AUSTIN
AUSTIN
G2
NOTE: This format may also be used in Joint Service Operations.
(Classification)
Figure A-7. Sample of a division intelligence annex (continued).
A-4 1
SITUATION REPORT
Preparation and submission of the SITREP is a staff responsibility of
the S3; however, the S2 prepares paragraph 1, Enemy, of the SITREP and
furnishes it to the S3 in usable form. Figure A-8 shows the prescribed
format for preparing a SITREP.
ENEMY .
Committed forces (overlay).
Forces committed against TF 2-80 are—
(1) Four mechanized platoons.
(2) Two medium tank platoons.
(3) Normal regimental artillery.
(4) Six 160mm mortars.
(5) Ten 122mm howitzers.
(6) Four 100mm artillery guns self-propelled (SP).
(7) Two 122mm multiple rocket launchers.
(8) One 152mm gun SP.
(9) Air and nuclear weapons.
Reinforcements (overlay). Reinforcements currently capable of being”
employed in sector now total: U/l Medium tk pit vie BD4156, MRC of 281st
MRR vie BD4867, MRC of 282d MRR vie BD4873, MRC of 281st MRR vie AB4673,
MRB (-) of 281st MRR vie AB4650, MRB of 282d MRR vie CD5060, U/l tk co vie
DE5265 .
Enemy Activity During Period I00600Z-101800Z.
(1) Occupation of previously unoccupied positions vie BG3531, NT3633,
MT3734, DT4239 .
(2) Movement of combat units fwd vie MN4036.
(3) Dispersal of tanks to fwd units vie CG3136.
(4) Movement of assault boats into vie GM3338.
(5) Two 100mm AT guns (SP) vie MT3737, two 120mm AT guns (SP) vie
ER3833 .
(6) Six additional 122mm how vie DT3731.
(7) Increased enemy counterbattery fire in bde sector.
(8) Clearing lanes through minefield BC2937.
(9) Mech regimental aid station vie CD3339.
( o) Increased enemy air activity vie FN2836, RB2437.
(11) Suspected jamming of VHF communications (intel net) at 100745Z
and 013252.
Concl usions. Enemy’s most probable courses of action-
(1) Continue defense now.
(2) Attack along our front within 8 hours.
Figure A-8. Sample situation report.
A-42
INTELLIGENCE REPORT
The INTREP is a standardized report which, based on its importance, is
disseminated without regard to a specific schedule. It is prepared at all
echelons when facts influencing the enemy capabilities have been observed,
or when a change in enemy capabilities has taken place. It is passed to
higher, lower, and adjacent units at the discretion of the commander
producing the report. It is sent as quickly as possible following receipt
of the information. Whenever time permits, the INTREP includes the
originating office’s interpretation of the information or intelligence
being reported. The first word of the report is INTREP. Otherwise, there
is no prescribed format for this report. It is not used in lieu of the
critical INTREP. Figure A-9 shows a message format for INTREPs that has
been developed for joint operations.
C110: Message Identification Number.
INTREP: The first word of the report must be “INTREP.’
HEADING: Addressee information and meg ctr data.
TEXT: Intelligence or information to be reported. Should answer
Who, What, Where, When and How Questions.
CONCLUSIONS: Whenever possible the INTREP should include the
originating office’s interpretation of the information
intelligence being reported.
Figure A-9. Sample INTREP message format.
Figure A-10 shows the Joint Chiefs of Staff (JCS) INTREP format.
MESSAGE HEADING
ORIGINATING AGENCY
ACTION ADDRESSEES
INFORMATION ADDRESSEES
SECURITY CLASSIFICATION AND CODE WORD OR NICKNAME
INTREP (number) AS OF DATE-TIME GROUP (GMT)/MO/YR
BODY Installation, Event, and Sighting Format
Reference to previous message, if any.
Source reliability evaluation.
Concise narrative description.
REMARKS: Any other information not covered in
the body of the report.
Figure A-10. Sample JCS INTREP message format.
A-43
INTELLIGENCE SUMMRY
The INTSUM provides a summary of the intelligence situation covering a
specific period of time dictated by the commander. Figures A-ll and A-12
show INTSUM formats. There is no specified format for the INTSUM, except
for joint service operations (see the format in Figure A-12).
Format of an INTSUM
NOTE: Omit items not applicable
unless otherwise indicated.
1. Issuing unit (always
incIuded).
2. Time and date of issue
(always Included).
3. Summary of enemy activity
for period.
a. Ground activity.
b. Trace of forward elements.
c. Potential targets for
clear weapons.
d. Nuclear activity.
e. CB activity.
f. Air activity.
g. Other (new tactics,
counterinteiIigence).
4. Enemy personnel and
equipment losses.
a. Personnel Killed in
Act ion (KIA).
b. EPW.
c. Equipment destroyed or
captured.
5. New obstacles and barriers.
6. Administrative activities.
7. New identifications.
a. Units.
b. Personalities.
8. Enemy movements.
9. Estimates number and types
of vehicles.
10. Weather and terrain
conditions.
11. Brief discussion of
capabiIities and
vuInerabiIities
(always included).
NOTE: In joint service operations,
IMMEDIATE
TO CG ED CORPS
INTSUM NUMBER 144 ENDING 040bQ0Z
PARA 3 ALFA ENEMY CONTINUED DEFENSE
IN ZONE EXCEPT FOR LOCAL ATTACK AT
0415 VICINITY RS37b751 WITH
ESTIMATED 10 MEN CMM 3 MEDIUM TANKS
CMM AND LIGHT ARTILLERY SUPPORT PD
ATTACK REPULSED PD PARA 3 DELTA
ATTACK PRECEDED AT 0410 BY VERY HIGH
AIR BURST NUCLEAR WEAPON CMM GROUND
ZERO RS3747bl CMM DELIVERY MEANS
UNDETERMINED CMM YIELD ESTIMATED AT
0 PD 5 KT PD PARA 3 FOXTROT ATTACK
SUPPORTED BY 2 JET ATTACK AIRPLANES
BOMBING AND STRAFING VICINITY
RS3%75b FOR 5 MINUTES STARTING AT
0425 PD PARA 4 ALFA CONFIRMED 20 KIA
CMM ESTIMATED 5 KIA PD PARA 4 BRAVO
10 INCLUDING 2 WIA PD PARA 4 CHARLIE
2 MEDIUM TANKS DESTROYED CMM 1
DAMAGED CMM 1 JET
ATTACK AIRCRAFT SHOT DOWN PD PARA b
PRISONER STATES AMMUNITION SUPPLY IN
FORWARD UNITS RUNNING LOW PAREN
CHARLIE DASH 3 PAREN PD PARA 7 ALFA
PATROL REPORTS BATTERY 152MM GUN
HOWITZERS AT RS303212 PD PRISONERS
CONFIRM LOCATION 2D BATTALION CMM
17F MRR VICINITY RS37575A PAREN
BRAVO DASH 1 PAREN PARA & AIRBORNE
RADAR RECONNAISSANCE DETECTED 10
TRUCKS MOVING SOUTH ON ROAD AT
RS3302A0 AT 0345 PD PARA 1 PROBABLY
ROUTINE SUPPLY VEHICLES PD PARA 10
SNOW STARTED AT 040545Z AND
CONTINUING PD GROUND FROZEN HARD AND
SUPPORTS ALL TYPES OF VEHICLES PD
use the format in Figure A-12.
Figure A-11. Format" and' sampfe of an "irfteTTigence summary.
A-44
12. Conclusions (always
included).
PARA 11 LOCAL ATTACK REPORTED
PROBABLY WAS TO SEIZE HILL 405 PD
ENEMY IS CAPABLE OF CONTINUING
DEFENSE IN PRESENT POSITION CMM
Examples of a Division INTSUM MAKING LOCAL ATTACKS TO IMPROVE
(full distribution not HIS DEFENSIVE POSITION CMM DELAYING
indicated) FM CG 520 Inf Div TO STRONGER POSITION ALONG LAURIEX
(Mech) RIVER PD PARA IE CONTINUED DEFENSE
IN PRESENT POSITION MOST PROBABLE-
NOTE: In joint service operations, use the format in Figure A-12.
Figure A-ll. Format and sample of an intelligence summary (continued).
HEAD ING
PRECEDENCE
ORIGINATING AGENCY
ACTION ADDRESSEES
INFORMATION ADDRESSEES
SECURITY CLASSIFICATION, CODE WORD, OR NICKNAME
INTSUM ( Number) FOR PERIOD ENDING DATE-TIME GROUP-MONTH-YEAR
BODY
1. SUMMARY OF ENEMY ACTIVITY FOR THE PERIOD . Is a summary of those that
occurred during the period of the report. It contains but not be limited
to the following:
a. GROUND ACTIVITY . Summarize major movements and activities of
enemy ground forces. Indicate estimated strength, composition,
disposition, and any other items of significance.
b. TRACE OF FORWARD ELEMENTS . The most forward location or main
location of the enemy force will be shown as a pinpoint position, area
boundary, or a series of connected points, as applicable. The following
methods for reporting locations is used and stated in the intelligence
annex.
Figure A-12. Intelligence summary for joint service operations.
A-45
(1) Operations Involving Ground Forces. For unified or joint
operations in which ground forces are directly participating, not
specifically provided for in the subparagraph below, the UTM system
prescribed for the area concerned is used to the maximum extent
practicable in communications between ground forces and other forces
jointly engaged. When the use of the UTM system is impractical, latitude
and longitude is used.
(2) Operations Not Involving Ground Forces, The World Geographic
Reference System (GEOREF) is used in joint operations which do not
directly involve ground forces.
(3) For Close Air Support of Ground Forces. When air forces
(including naval aviation) are acting in close air support of ground
forces, the UTM system prescribed for use by ground forces in the area
concerned is used.
(4) For Joint Amphibious Operations. The UTM system prescribed
for use by landing forces within the amphibious objective area is used for
support of landing force operations by all supporting forces.
(5) For Joint Air Defense Operations. GEOREF is used in joint
air defense operations. When there is a possibility of confusing which
system to use in reporting positions, the reference system should be
indicated in the report. GEOREF is not used by air forces (including
naval aviation) when reporting positions to ground forces, except in air
defense operations. GEOREF is used by ground forces when reporting
positions to air forces in air defense operations.
(6) in joint operations not using procedures specified in the
above paragraphs, latitude and longitude is used.
c. POTENTIAL TARGETS FOR NUCLEAR WEAPONS . List all potential nuclear
targets, such as concentrations of troops or equipment observed during
period. Include location, date, and time (Zulu) of observation.
d. NUCLEAR ACTIVITY . Enemy nuclear capability observed during the
period is reported. Include any changes to previously reported
capabilities. Indicate location, date, and time (Zulu) of observation of
artillery, missile, or air nuclear capability.
e. NUCLEAR. BIOLOGICAL, AND CHEMICAL ACTIVITY . Indicate NBC weapons
(agents) employed or capability by type, location, date, and time (Zulu)
of occurrence.
f. AIR ACTIVITY . All enemy air activity that has occurred during the
period (CAS, air interdiction, AD, and reconnaissance affecting the
Figure A-12. Intelligence summary for joint service operations (continued).
A-46
operation is summarized, including location, date and time (Zulu), and
type of aircraft involved.
g. NAVAL ACTIVITY . Summarize all enemy naval activity that has
occurred during the period. include location, date and time (Zulu), and
types of ships and craft.
h. OTHER . New tactics observed are summarized. Cl measures of
significance, including active and passive measures, are listed. Any item
not properly reported in any other paragraph also may be included.
2. ENEMY PERSONNEL AND EQUIPMENT LOSSES .
a. PERSONNEL . List in separate categories confirmed Kl A (body
count) , estimated KIA, estimated wounded in act on (WIA), and captured.
b. EQUIPMENT AND MATERIEL . List by number and type the enemy
equipment and materiel losses during the period. Include damaged enemy
equipment separately.
3. NEW OBSTACLES AND BARRIERS . List those identified during the period
by type and location.
4. ADMINISTRATIVE ACTIVITIES . Summarize enemy activities pertaining to
personnel replacements, supply buildup, or other unusual logistic activity
but not information or intelligence reported elsewhere in the INTSUM.
5. NEW IDENTIFICATIONS .
a. UNITS . List new units identified during the period. Include
location, date and time (Zulu), and unit making the identification.
b. PERSONALITIES . List significant individuals identified during the
period by name, rank or title, and organization.
6. ENEMY MOVEMENTS . Summarize significant enemy movements by type,
activity, location, and unit designation, if known.
7. ESTIMATED NUMBER AND TYPES OF VEHICLES. SHIPS, AIRCRA FT. Summarize by
type the estimated number of vehicles, ships, and aircraft available to
the enemy.
8. WEATHER AND TERRAIN CONDITIONS . A summary of the weather and terrain
conditions during the period that would have an effect on subsequent
operations.
Figure A-12. Intelligence summary for joint service operations (continued).
A-47
9. BRIEF DESCRIPTION OF CAPABILITIES AND VULNERABILITIES . (Always
included.) State courses of action which the enemy most probably will
adopt.
NOTE: Paragraphs and subparagraphs for which no information has been
obtained are omitted in the preparation of the INTSUM. Each topic
reported upon retains the numerical (and letter) designation outl ined
above.
Figure A-12. Intelligence summary for joint service operations (continued).
PERIODIC INTELLIGENCE REPORT
The PERINTREP is a summary of the intelligence situation covering a
longer period than the INTSUM. It is a means of disseminating detailed
information and intelligence. Other intelligence documents like technical
intelligence summaries, EPW interrogation reports, translations of captured
documents, and weather and climate summaries are disseminated as appendixes
to the PERINTREP. The PERINTREP is concise--but complete--and makes
maximum use of sketches, overlays, marked maps, and annexes.
Although not normally prepared by intelligence officers at division
and lower levels, PERINTREPs provide detailed information and intelligence.
Therefore, intelligence officers at these levels should be familiar with
the format and content of PERINTREPs.
The PERINTREP is normally published every 24 hours. The beginning and
end of the period is selected to permit dissemination of the PERINTREP in
time for its use in daily planning. It is disseminated by the most
suitable means consistent with its volume and urgency. Figure A-13 shows
the PERINTREP format.
The Supplementary Intelligence Report (SUPINTREP) is a comprehensive
analysis of one or more specific subjects. This report is formatted like a
PERINTREP and usually contains selected intelligence data collected over an
extended period of time. It includes additional details on items contained
in other reports. The report is disseminated based on the intell igence
contained in the report and the desires of the commander. It
is normally produced as the result of a request or in support of a
particular operation.
A-48
(Classification)
copy No _
Unit
Location
Date-time group
Message reference number
PERINTREP NO _
Period Covered: (date and time to date and time).
References: Maps or charts.
Disposal instructions: (if any).
1. GENERAL ENEMY SITUATION. This paragraph contains a brief summary of
enemy operations during the period. Amplifying details are furnished in
the paragraphs that follow and in appropriate annexes, or both. This
paragraph provides brief highlights of the anemy situation and the
significance of the enemy’s major activities, to include marked changes in
morale, strengths, dispositions, tactics, combat effectiveness, and
equipment. Data that is langthy or can conveniently be shown graphically
are presented in annexes.
2. ENEMY ACTIVITIES. This paragraph, in conjunction with those following,
providas the details of the situation summarized in paragraph 1. Detailed
intelligence provided in this paragraph covers all operational activities.
Information may be presented graphically by overlays, printed maps, sketch
maps, and annexes. Subparagraphs are omitted when appropriate intelligences
is not available or is adequately covered by othar portions of this report,,
a. Ground. (Primarily includes activities of combat arms, raserves,
and reinforcements; also includes enemy defensas, minefield,
fortifications, barriers, obstacles, and other defensive works.)
b. Air. (Includes Air Force activities, such as bombing, close air
support, tactical aerial reconnaissance, air surveillance, and
air-supported operations.)
c. Airborne.
d. Irregular.
e. NBC operations.
f. EW.
_ (Classification) _
Figure A-13. Sample format for a periodic intelligence report.
A-49
g. Other. (Normally includes other than combat arms; includes
appropriate comments not covered in other subparagraphs on reserves,
reinforcements, new tactics, weapons and equipment, administrative
installations, combat service support, and technical intelligence.)
3. ORDER OF BATTLE, Frequently, this paragraph will consist only of
references to the enemy SITMAP (or overlay) and to the OB annex, which is
developed using the format shown below. When desired by the commander,
particularly significant 06 changes may be summarized in addition to being
discussed in detail in the 06 annex.
a. Composition and Disposition.
b. Strength. (Personnel and major weapons and items of equipment.)
(1) Losses.
(2) Current strength.
c. Tactics,
d. Training.
e. Css .
f. Combat Effectiveness.
g. Miscellaneous Data.
4. COUNTERINTELLIGENCE. This paragraph, or parts thereof, should be
issued as an annex if a limited distribution is required.
a. General. (A short summary of the Cl situation during the period.)
b. Espionage.
c. Sabotage.
d. Subversion.
e. Communication and Noncommunication Security.
f. Miscellaneous.
5. WEATHER. This paragraph gives a summary of the effect of weather on
operations during the period.
(Classification)
Figure A-13. Sample format for a period intelligence report (continued).
A-50
(Classification)
6. TERRAIN. Use an annex, special maps, and overlays, when possible,
include impact on future operations, if appropriate.
7. ANALYSIS AND DISCUSSION. This paragraph lists and discusses briefly
enemy capabilities and vulnerabilities. The conclusions present the
commander’s assessment of the most probable courses of action available to
the enemy, probability of their adoption, and vulnerabilities that are
exploitable by own, higher, or lower levels of command.
a. Enemy Capabilities.
b. Enemy Vulnerabilities.
c. Conclusions.
Authentication:
Annexes: (Any intelligence document may be distributed as an annex to a
PERINTREP. Although annexes are a means of distributing detailed
intelligence and information, care is exercised to avoid unnecessary bulk
and duplication.)
DISTRIBUTION:
(Classification)
Figure A-13. Sample format for a periodic intelligence report (continued).
PERIODIC INTELLIGENCE SUMMARY
The periodic intelligence summary (PERINTSUM) is a detailed hard copy
summary of the intelligence situation covering a period of time specified
by the force commander (normally 24 hours or more). The PERINTSUM is a
means of disseminating concise and complete detailed information and
intelligence and makes maximum use of sketches, overlays, annotated maps,
and annexes. Normally, this report is prepared at corps level and higher.
It is disseminated two echelons higher, two echelons lower, and to
adjacent units; however, subordinate units also may be tasked to prepare a
PERINTSUM. Figure A-14 shows a JCS message format for the PERINTSUM,
structured to facilitate updating the intelligence estimate.
A-51
HEAD ING
PRECEDENCE
ORIGINATING AGENCY
ACTION ADDRESSEES
INFORMATION ADDRESSEES
SECURI TY CLASSIFICATION, CODE WORD, OR NICKNAME
PERINT SUM (Number ) FOR PERIOD ENDING DATE-TIME GROUP-MONTH-YEAR
BODY
1. AREA OF OPERATIONS . State conditions which exist and indicate the
effect of these conditions on enemy capabilities and the assigned
mission. The characteristics of the area are based on the facts and
conclusions of an analysis of the AO, as follows:
a. TOPOGRAPHY . Include information available on observation and
fields of fire, concealment and cover, obstacles, key terrain features,
AAs, nuclear fires, biological and chemical agents, and so forth. Graphic
representation may be included, if necessary.
b. HYDROGRAPHY . Include general relief of beaches and beach
approaches, surf conditions, tides and currents, navigational aids,
identifying features, channels, water depths, rocks and shoals, obstacles,
anchorages, beach trafficability, coastline, contiguous islands, and
compartmentation, as each affects operations.
c. CLIMATE AND WEATHER . Discuss weather during the period which will
affect operations.
d. TRANSPORTATION . Include status of beaches, beach airways,
pipelines, and inland waterways. The following should be included:
capacities, surface conditions, bridges, amount and condition of rolling
stock, motor and air transport, barges, freighters, and other inland
waterways craft. Vulnerabilities are reported in as much detail as
possible.
e. ELECTRONICS AND TELECOMMUNICATIONS , Report existing electronic
telecommunications systems and equipment, both military and civil.
f. POLITICS, The extent of civil control of the region, the
amenability of the civilian population to political control, the political
organizations, and the key political figures.
Figure A-14. Sample periodic intelligence summary.
A-52
Figure A-14. Sample periodic intelligence summary (continued).
A-53
(3) N ew Tactics. Weapons, and Equipme nt. List new tactics,
weapons, and equipment which may affect the mission and enemy
capabilities.
c. NAVAL FORC ES (Including amphibious forces).
(1) Strength and Dispositions . Summary of enemy units and
locations.
(2) Order of Battle . Summary of opposing forces and other enemy
forces that can affect accomplishment of mission.
(3) N ew Tactics. Weapons, and Equipmen t. List new tactics,
weapons, and equipment which may affect the mission and enemy
capabilities.
d. MISSILE FORCES (Excluding SAMs).
(1) Strength and Dispositions . Summary of enemy units and
locations.
(2) Order of Battle . Summary of opposing forces and other enemy
forces that can affect accomplishment of mission.
(3) N ew Tactics. Weapons, and Equipme nt. List new tactics,
weapons, and equipment which may affect the mission and enemy
capabilities.
e. ANTIAIRCRAFT DEFENSE S (including SAM).
(1) Strength and Dispositions . Summary of enemy units and
locations.
(2) Order of Battle . Summary of opposing forces and other enemy
forces that can affect accomplishment of mission.
(3) N ew Tactics. Weapons, and Equipme nt. List new tactics,
weapons, and equipment which may affect the mission and enemy
capabilities.
f. AIRBORNE UNITS .
(1) Strength and Dispositions . Summary of enemy units and
locations.
(2) Order of Battle . Summary of opposing forces and other enemy
forces that can affect accomplishment of mission.
Figure A-14. Sample periodic intelligence summary (continued).
A-54
(3) New Tactics Weapons, and Equipmen t. List new tactics,
weapons, and equipment which may affect the mission and enemy
capabilities.
3 .. ENEMY MILITARY SITUATION .
a. IDENTIFICATION OF COMMITTED GROUND FORCES .
(1) Movement and Locations . Report disposition, location, and
echelon of control of enemy ground forces.
(2) Reinforcements . Report disposition, location, and echelon of
control of enemy ground force reinforcements.
(3) Logistics . Report the following elements of the enemy’s
logistic system: transportation, storage distribution, levels of supply,
critical shortages.
(4) Equipment . Report weapons systems and equipment used by
committed enemy ground forces.
(5) Personalities . Report significant individuals operating for
the enemy ground forces.
(6) Morale . Report any significant breakdown or buildup of enemy
norale.
(7) P ersonnel and Materiel Losses .
(a) KIA.
1 Body count.
2 Estimates.
(b) WIA (estimated).
(c) Captured.
(d) Materiel losses.
(8) Analysis of Capabilities . Analyze each capability of
enemy-committed ground forces, considering all applicable factors in item
3a above.
Figure A-14. Sample periodic intelligence summary (continued).
A-55
b. IDENTIFICATION OF AIR FORCES .
(1) Operational Capability (aircraft and airfields). Report
observed aircraft operational capability, including numbers of aircraft,
fuel status, weapons, and status of the airfield.
(2) Movements and Locations . Report movements and locations of
al I observed aircraft and airfields,
(3) Materiel and Personnel Losses .
(a) Aircraft.
1 Confirmed destroyed in the air.
2 Confirmed destroyed on the ground,
3 Confirmed damaged in the air.
4 Confirmed damaged on the ground.
5 Probable destroyed.
6 Probable damaged.
(b) Ground equipment.
1 Destroyed.
2 Damaged.
(c) Personnel.
1 KIA.
a Confirmed,
b Estimated.
2 WIA (estimated).
3 Captured.
(4) Morale . Report any significant breakdown or buildup of enemy
morale.
(5) Electronic Warfare Capability . Report enemy ECM, ECCM, and
ESM capabilities and activities.
Figure A-14. Sample periodic intelligence summary (continued).
A-56
(6) Nuclear Capability . Report nuclear weapons observed,
including type, yield, numbers, method of del ivery, and enemy doctrine
concerning their use.
(7) Analysis of Capabilities . Analyze each capability of enemy
air forces, considering all applicable factors in item 3b above.
c. IDENTIFICATION OF NAVAL FORCES .
(1) Operational Capability . Report observed naval forces’
operational capability, including numbers of ships, operational weapons,
and problems which could affect their successful employment.
(2) Movements and Locations . Report movement and location of all
observed naval forces.
(3) Ships. Materiel, and Personnel Losses .
(a) Ships (identification by name, class, type).
1 Confirmed sunk.
2 Probable sunk.
3 Damaged.
(b) Shore-based equipment and facilities.
1 Destroyed.
2 Damaged.
(c) Personnel .
1 KIA.
a Confirmed,
b Estimated.
2 WIA (estimated).
3 Captured.
(4) Morale . Report any significant breakdown or buildup of enemy
morale.
(5) Electronic Warfare Capability . Report enemy ECM, ECCM, and
ESM capabilities and activities.
Figure A-14. Sample periodic intelligence summary (continued).
A-57
(6) Analysis of Capabilities . Analyze each capability of enemy
naval forces, considering all applicable factors in item 3c above,
4. ENEMY UNCONVENTIONAL AND PSYCHOLOGICAL WARFARE .
a. IDENTIFICATION OF GUERRILLA FORCES . Identify guerrilla forces
being used in friendly areas or areas newly seized from the enemy.
b. PSYCHOLOGICAL WARFARE . Discuss psychological warfare, including
enemy methods and facilities observed for the conduct of propaganda, the
susceptibility of the population of the target area, and the major or main
focus of the enemy’s psychological warfare efforts.
5. COUNTERINTELLIGENCE .
a. SABOTAGE . Report enemy sabotage effects observed, including
information concerning his methods, targets, sensitive targets in the AO,
and successes or fai lures.
b. ESPIONAGE . Report enemy efforts to collect information by types
of espionage: designation (trained agents) or saturation (mass use of
citizenry) and include methods of pressure, coercion, and enforcing the
saturation-type espionage.
6. CONCLUSIONS . State conclusions derived from item 3 above, and
include, when possible, a concise statement of the effects of each enemy
capability on the accomplishment of the assigned mission. Cite enemy
vulnerabilities, where possible.
Figure A-14. sample periodic intelligence summary (continued).
RECONNAISSANCE EXPLOITATION REPORT
The RECCEXREP disseminates results obtained from the first rapid
interpretation of imagery and debriefing of the aircrew. The report
addresses those targets requested in the original tasking with each target
addressed separately. The RECCEXREP is submitted as rapidly as possible,
but not later than 45 minutes after engine shutdown. If review of the
imagery results in information contradictory to that in an earl ier
RECCEXREP, the new information is to be reported promptly in another
RECCEXREP. Table A-1 shows an annotated format for the RECCEXREP.
A-58
Table A-1. Sample reconnassance exploitation report annotated format.
Standard Message Heading
RECCEXREP
Air Reconnaissance Mission
Number:
A. Location identifier:
B. Time on target; time
of sighting.
C. Results:
D. Other information
1. TARWI:
2. Imagery confirmed:
E. *Type sensor, exposures:
F. ‘Percentage of coverage:
Standard Message Heading
RECCEXREP
2/R/501
A. PB088195
B. 241610Z
C. CAT 06
1. Type: Motor rifle
and tank.
2. Status: Moving northwest
on road from Rotterode to
Asbach.
3. Activity: 24xT-62, 9xBMP.
4. Defenses: 2xZSU-23-4 moving
with and defending target.
D. None.
1. TARWI 1234X
2. Yes
E. Good, large
F. 100 percent.
* To be completed if significant or requested.
NOTE: Target category codes are found in STANAG 3596. Standard
message headings are noted in AR 105-31. The RECCEXREP replaces
the hot (high priority) photographic report (HOTPHOTOREP) and
mission report (MISREP) (except that the MISREP is used for
negative mission results) in USAREUR. It may soon be accepted
for use by US forces worldwide.
INITIAL AND SUPPLEMENTAL PROGRAMMED INTERPRETATION REPORT
The initial programed interpretation report (IPIR) and the
supplemental programmed interpretation report (SUPIR) are used to report
intelligence obtained from imagery which has not been reported through
previous reports. The format for both reports is the same and should be
used to report data acquired from a systematic review of imagery or to
report more detailed information than is provided in other reports. These
reports are prepared in either manual or ADP formats.
The IPIR is no t completed on all missions and must be requested. It
is disseminated w thin four hours of engine shut-down. The IPIR reports
on programed miss on objectives or other vital intelligence information
which is readily dentified in reasonable proximity to these objectives
and which has not been reported in earlier reports.
A-59
The SUPIR reports on all significant targets covered by the mission
and not included in other reports or when supplemental information is
required. The SUPIR is completed at higher headquarters only if they
decide it is necessary.
Table A-2 shows the format used for both the I PI R and the SUPIR. This
format also is used for joint service operations.
Table A-2. Initial and supplemental programmed interpretation reports.
Standard Message Heading
I PI R (or SUPIR)
Air Task or Mission Number:
PART I: Mission highlights:
PART II: Significant results:
A. Perishable items:
B. Change and OB items:
Target 3: CAT 01/PB4056
241644Z/P0027.
3. Update: AOB: 6 Flagons
21 Fishbed
4 Hook
C. Bonus items:
D. Damage assessment:
PART III: Other results:
A. Additional items:
B. Identification only items:
PART IV: Mission collection
results:
A. Collector’s objectives
satisfied:
B. Collector’s objectives
not satisfied:
Standard Message Heading
I PI R
2/R/501
PART I: One new SA-2 site observed
PART II:
A. Target 1: CAT 06/PB088195/
241610Z/LOOII-0113
1. Motorized rifle and tanks
2. Moving northwest on
Road Rotterrode-Asbach.
3. 24xT-62, 9xn intelligence annex.
4. Two occupied air warning
(AW) positions approx 200m
west of site.
5. One FAN SONG E radar in
center of site.
6. Six transporters; two van
trucks, four cargo trucks.
B. Air order of battle (AOB)
D. (Not used.)
E. (Not used.)
PART III: (Not used.)
A. NTR (nothing to report.)
B. NTR
PART IV:
A. NTR
B. CAT 4/PB1437/241653Z/
camera malfunction.
(When issued separately from an OPORD)
A-60
INTERROGATION AND TRANSLATION REPORTS
Interrogation reports summarize the results of interrogations of EPW,
civil ian detainees, or refugees, and the translations of summaries of
enemy documents. Information of immediate value is disseminated in spot
reports.
The initial interrogation report serves as a written summary of the
initial interrogation of each prisoner. Figure A-15 shows the format of
this report. Emphasis is placed on completing as much of the tactical
interrogation as possible at the lowest level and supplementing this with
further interrogation at higher echelons. The primary purpose of this
report is to preclude duplication of effort in subsequent interrogations.
The detailed interrogation report is used to record information
obtained in the course of subsequent interrogations of selected
interrogees. Figure A-16 shows its format. A more detailed interrogation
and screening report format is available in FM 34-52.
During joint service operations, interrogation information of
immediate tactical interest (obtained at the brigade or regimental level)
is generally reported in the INTREP. Follow-on interrogation reports, the
initial interrogation report, and the detailed interrogation report
disseminate more complete and comprehensive information. It is essential
that these follow-on reports reference the INTREP where the information
first appeared to ensure that the information contained in these reports
is not used to confirm the preliminary information contained in the
INTREP.
Joint services use the document translation report to report
information gained through the translation of documents which contain
information of tactical value. Figures A-17 and A-18 show the format and
sampLe of a translation report. Full or extract translations are
accomplished as the intelligence officer directs. All translations are
prepared in triplicate, unless otherwise directed, and each translation is
conspicuously annotated with the word “Draft.”’
The original of the translation is appended to the document when it is
forwarded to the next higher headquarters. Copies of the original
document are provided to the intelligence officers at echelons which
contain translation sections to support their journal entries. The
document translation report format also is used for joint service
operations. Figures A-19 and A-20 show sample screening reports. Figures
A-21 and A-22 show sample tactical interrogation reports. These reports
are used to record information on interrogees.
A-61
(Classification)
REPORT NO
CY NO _ DATE-TIME(Zulu)
SOURCE
(Numbered sequentially)
I NTG UNIT
(last name only)
CATEGORY A B C D
(see detailed report)
(attached to interrogator)
MAPS USED _
(1 ist sheet name, number, and scale of maps)
LANGUAGE USED
PART I INTELLIGENCE POTENTIAL OF ENEMY PRISONERS OF WAR
(rank) (last name, first name)
(Ml) (service or serial number)
DOB
(day, mo, yr)
NATIONALITY _
LANGUAGES
BIRTHPLACE
RACE _
UNIT
(city, county, or country)
(list and include
proficiency)
(interrogees’ parent unit listed
completely to highest headquarters)
CIVILIAN CAREER
(summarize prisoner’s premilitary career)
MILITARY CAREER _
(summarize)
ASSESSMENT _
(intelligence, experience, cooperation, and reliability of the
interrogee, NOT the information)
SPECIALIST KNOWLEDGE _
(knowledge of technical subjects or equipment)
DOCUMENTS _
(carried at time of capture; include money or valuables)
EQUIPMENT _
(of intelligence interest) (personal equipment or weapons)
PART II - INFORMATION OBTAINED_
(summarize)
(Classification)
Figure A-15. Initial interrogation report.
A-62
(CLASSIFICATION)
_INTG TEAM
UNIT _
(place and coordinates)
DATE AND TIME _
(Zulu)
Detailed Interrogation Report No _
(number reports sequentially)
Maps _
(list all maps used and indicate sheet name, number, and scale)
PART I
1. RANK _ NAME _ SER NO _
(last name, first name, Ml)
(interrogees’ parent unit listed completely; for example, 1st
Pit, A company, 103 Recon Bn, 3d Rifle Div)
CIRCUMSTANCES OF CAPTURE _
(summary of details of capture, including
date and time, location or coordinates, and
capturing unit)
ASSESSMENT _
(intelligence, experience, reliability) (Concise statement
of the interrogator’s assessment of the prisoner--not of
the information acquired)
CATEGORY: A B C D
(circle one to describe prisoner’s intelligence potential, as
indicated) :
A High-level prisoner whose broad and specific knowledge of the war
effort makes interrogation necessary without delay by specially
qualified interrogators at the highest level; that is general
officers, scientists, political and intelligence officers, and so
forth.
(CLASSIFICATION)
Figure A-16. Detailed interrgation report.
A-63
(CLASSIFICATION)
B Prisoner who has enough information about the enemy or any subject of
value to intelligence, in addition to information of tactical value,
to warrant a second interrogation.
c Prisoner with information of immediate tactical value who will not
warrant further interrogation.
D Prisoner of no intelligence value.
DOCU MENTS _
(list documents of intelligence value taken from the prisoner)
EQUI PMENT _
(list equipment of intelligence value taken from the prisoner)
PART II
2. ORGANIZATI ON, STRENGTH, AND DISPOSITION.
a. Organ ization _
(summarize the enemy organization as stated by the
prisoner, including equipment authorized and on hand)
i). Strength _
(personnel strength, officer and enlisted, authorized and
assigned!
c. Disposition _
(location of enemy units known to the prisoner)
3. MISSION _
(statement of enemy missions, beginning with the lowest unit)
4. OTHER ENEMY FORCES _
(information of enemy forces other than the
prisoner’s own immediate organization; include and
annotate fact and rumor)
5. SUPPLY, LOSSES, REPLACEMENT.
a. supply _
(information concerning status of SUPPI ies, known shortages
and deficiencies)
_ (CLASSIFICATION) _
Figure A-16. Detailed interrogation report (continued).
A-64
b. Losses
(CLASSIFICATION)
(statement of personnel and equipment losses known to
prisoner)
c. Replacements _
(number and date received, sufficiency, and so forth)
6. PERSONALITIES _
(list by name, rank, organization, duties, and
characteristics)
7. MISCELLANEOUS.
a. Morale _
b. Tact i cs _
(new or unusual tactics)
c. Obstacles _
(location, coordinates, type)
d. Other Information _
(other information of intelligence value not
covered above)
8. REMARKS
NAME _
(of Interrogator)
GRADE _
TRANSLATOR _
(if used)
Figure A-16 Detailed interrogation report (continued).
A-65
(CLASSIFICATION)
DATE:
- 0 :
ROM: REPORT NUMBER:
1. CONTROL DATA.
1. DOCUMENT NUMBER,
2. DOCUMENT DESCRIPTION: (type of document, originating headquarters,
language, and number of pages),
3. DOCUMENTS ORIGINAL LANGUAGE.
4. DATE AND TIME RECEIVED.
5. DATE AND TIME OF CAPTURE: (date and time (Zulu) and place,
including coordinates; if obtained from an individual, identify) .
6. PLACE OF CAPTURE.
7. CAPTURING UNIT: (unit initially obtaining document).
8. CIRCUMSTANCES OF CAPTURE.
9. TRANSLATOR.
10. TYPE OF TRANSLATION: (state whether extract or complete
translation)
TEXT OF TRANSLATION (Translation typed in here, using the format of
the document. Use continuation sheets as needed).
(CLASSIFICATION)
Figure A-17. Documen translation report.
A-66
(CLASSIFICATION)
DATE : 231500ZAug88
TO: G2, X Corps
FROM: Team 1, IPW Section REPORT NUMBER: 08-0356
441st Ml Bn, 23 Div (Armd)
X Corps
PART 1: CONTROL DATA
1. DOCUMENT NUMBER: US-WAIBVC-03093
2. DOCUMENT DESCRIPTION: Personal letter, 1 page, handwritten,
mentions a tank factory disguised as a sugar processing plant, and school
teachers and elderly people working in factories.
3. DOCUMENT’S ORIGINAL LANGUAGE: Russian
4. DATE AND TIME RECEIVED: 240847ZAug88
5. DATE AND TIME OF CAPTURE: 230923ZAug88
6. PLACE OF CAPTURE: NB640320
7. CAPTURING UNIT: A/1-41/23 AD
8. CIRCUMSTANCES OF CAPTURE: Found in an abandoned enemy CP,
9. TRANSLATOR: SSG Bennett
10. TYPE OF TRANSLATION: Full
PART 2. TEXT OF TRANSLATION
My dear Serzhen’ka:
It has been a long time since I received a letter from you. How are
and where are you? The last time you wrote that fighting was going on
around you all the time, and this worries me a lot. Take care of
yourself. There have been many changes at home. Your mother, despite her
age, had to go to work in the factory. They make tanks there, but the
sign over the entrance says this is a sugar plant. I don’t know why they
do this. At the school where I work, we were also told to go and work at
the same plant. They are going to close the school. Everyone has either
to go to the front or work in the war industry. This is necessary in
order to speed up the victory over the enemy of our country. I would be
more at ease if I knew that you are alive and well. Please write as soon
as you can.
Your KATHY.
(CLASSIFICATION)
Figure A-18. Sample translation report.
A-67
(CLASSIFICATION)
WORKING PAPERS
DEPARTMENT OF THE ARMY
1st Brigade IPW Team, 123d Ml
APO New York, New York 09166
IPW TEAM REPORT NUMBER:
DATE-TI ME:
SCREENING REPORT
PART I . INFORMATION CONCERNING CAPTIVE :
A. PREVIOUS SCREENING OR INTERROGATION REPORTS (Unit or Report No!
B. CAPTURE INFORMATION:
1. CAPTIVE TAG NUMBER:
2. CAPTURING UNIT:
3. DATE-TIME OF CAPTURE:
4. PLACE OF CAPTURE:
5. Documents Captured (Disposition):
6. Equipment Captured (Disposition):
7. Circumstances of Capture:
c. BIOGRAPHICAL INFORMATION:
1. Full Name, Rank, Service Number:
2. Date, Place of Birth:
3. Sex, Marital Status, Religion: _
4. Full Unit Designation or Unit Code: _
(CLASSIFICATION)
WORKING PAPERS
Figure A-19. Sample blank screening report.
A-68
(CLASSIFICATION;
WORKING PAPERS
5. Duty Position: _
6. Military Education
and Experience:
7. Civilian Education and Experience: _
8. Languages Spoken (Proficiency) : _
D. OBSERVATIONS
l. Physical Condition of Captive: _
Uniform, insignia (type and condition):
3. Assessment of Attitude and Behavior:
4. Assessment of Knowledgeability: _
PARTII. SCREENING RECOMMENDATIONS
A. SCREENER’S RECOMMENDATIONS :
' Screener’s and Interpreter’s Names: _
2 Place of Screening:
3. Screening Code: _
9. SENIOR INTERROGATOR’S RECOMMENDATIONS:
Senior interrogator’s Name:
A-69
(CLASSIFICATION)
WORKING PAPERS
DEPARTMENT OF THE ARMY
1st Brigade IPW Team, 123d Ml
APO New York, New York 09166
IPW TEAM REPORT NUMBER: 007 DATE-TIME: 181530 AUG 99
SCREENING REPORT
(PART I . INFORMATION CONCERNING CAPTIVE:
>A. PREVIOUS SCREENING OR INTERROGATION REPORTS (Unit or Report No)
13. CAPTURE INFORMATION:
1. CAPTIVE TAG NUMBER: P-4A
2. CAPTURING UNIT: C Trp, 1st Sqdn, 8 ACR
3. DATE-TIME OF CAPTURE: 181300 AUG 99
4. PLACE OF CAPTURE: NB621108
5. Documents Captured (Disposition): lx ID card no 1350412 (retained
by EPW); lx personal letter (evac with EPW); lx map section (evac
with EPW).
6. Equipment Captured (Disposition): lx ShM protective mask (retained
by EPW); lx standard web gear, lx individual first aid kit (both
destroyed in place). lx 5.45rnn AK-74 w/4x mag (129x rds)
(evacuated through supply channels).
7. Circumstances of Capture: Surrendered to US Patrol
C. BIOGRAPHICAL INFORMATION :
1. Full Name, Rank, Service Number: Boris Petrovich BARONOV, JrSGT,
No 0951046
2. Date, Place of Birth: 16 JAN 78, BRYANSK, BySSR, USSR
3. Sex, Marital Status, Religion: Male, Single, None
(CLASSIFICATION)
WORKING PAPERS
Figure A-20. Sample completed screening report.
A-70
(CLASSIFICATION)
WORKING PAPERS
4. Full Unit Designation or Unit Code: Would Not Answer (WNA);
QKN-854
5. Duty Position: WNA
6. Military Education and Experience: WNA
7. Civil ian Education and Experience: 10 yrs compulsory civil an
education
8. Languages Spoken (Proficiency): Ukrainian (N) , Russian (FL
D. OBSERVATIONS
1. Physical Condition of Captive: Good
2. Uniform, Insignia (type and condition): Standard Soviet uniform,
with JrSgt rank tabs and MR insignia, dirty and torn.
3. Assessment of Attitude and Behavior: Calm, cooperative.
4. Assessment of Knowledgeability: UNK
PART II. SCREENING RECOMMENDATIONS
A. SCREENER’S RECOMMENDATIONS :
1. Screener’s and Interpreter’s Names: SSG BROWN, None
2. Place of Screening: IPW See, 123d Ml Bn Ml, 23d Inf Div (Mech
3. Screening Code: A-2
B. SENIOR INTERROGATOR S RECOMMENDATIONS :
1. Senior Interrogator’s Name: MSG MOSCHETTI
2. Interrogate: YES
3. Action: None
(CLASSIFICATION)
WORKING PAPERS
Figure A-20. Sample completed screening report (continued).
A-71
(CLASS:F:CATiON)
Working Papers
Date
TACTICAL
INTERROGATION REPORT
'0AME OF PRISONER: LAST NAME SOURCE INTERROGATOR: RANK and LAST NAME
CATEGORY: A B C D UNIT OR FORMATION TO WHICH I NT G_
ATTACHED: _
INTG SERIAL NO: _ MAPS USED: _
DTG OF I NTG: __ LANGUAGE USED:
I NTG REPORT NO: _ INTERPRETER: _
PART i - INTELLIGENCE POTENTIAL OF ENEMY PRISONER OF WAR (EPW)
A. PERSONAL PARTICULARS :
1. Rank, full name, service number, and position:
2. Date and place of birth:
3. Nationality: Ethnic: Religion:
4. Knowledge of languages and proficiency:
5. Unit, formation or organization:
6. Date-time, place or grid references, capturing unit, and
circumstances of capture:
3. CAREER :
1. Pre-mi I itary:
ParamiI itary Tng:
2. Mii i tary:
C. ASSESSMENT OF INTELLIGENCE VALUE :
1. intelligence, experience, cooperation, reliability:
2. Specialist knowledge:
3. Discussion of approach techniques:
(CLASSIFICATION)
Figure A-21. Sample blank tactical interrogation report.
A-72
(CLASSIFICATION)
Working Papers
Date
D. DOCUMENTS CARRIED AT TIME OF CAPTUJRE :
List of documents:
L 1 Details of money and valuables:
E. EQUIPMENT OF INTELLIGENCE INTEREST CARRIED AT TIME OF CAPTURE :
1. Personal Equipment:
2. Weapons:
PART II - INFORMATION OBTAINED
A. SUMMARY :
DOI is Time of Capture (TOC) unless otherwise indicated in the
body of this report.
B. TEXT:
i. MISSIONS
a EPW (or) EPW and
(1) TOC:
(2) Fut:
(3) Past:
b. Unit:
(1) Pres:
(2) Fut:
(3) Past:
(CLASSIFICATION)
Working Papers
Figure A-21. Sample blank tactical interrogation report (continued).
A-73
(CLASSIFICATION)
Working Papers Date
c. Unit:
(1) Pres:
(2) Fut:
(3) Past:
2. COMPOSITION:
3. STRENGTH:
a. Personnel :
( 1 )
( 2 )
(3)
b. Weapons and Equipment:
( 1 ) individual Weapons:
(a)
(b)
(2) Crew-served Weapons:
(a)
(b)
(CLASSIFICATION)
Working Papers
Figure A-21. Sample blank tactical interrogation report (continued).
A-74
(CLASSIFICATION)
Working Papers
Date
(3) Other Weapons:
(a)
(b)
(4) Armored Vehicles:
(a)
(b)
(5) Other Vehicles:
(a)
(b)
(6) Communications Equipment:
(a)
(b ;
(7) NBC Equipment:
(a) IndividuaI:
((D)
( ( 2 ) )
(b) Vehicular:
((D)
(( 2 ))
(8) Specialized Equipment:
(a)
(b)
(CLASSIFICATION)
Working Papers
Figure A-21. Sample blank tactical interrogation report (continued).
A-75
(CLASSIFICATION)
Working Papers
Date
4 . DISPOSITIONS
a, Activity, FUD, 6 digit grid coordinate, physical description,
collocated units: _, sc *y measures: -■
b.
5. TACTICS:
a. Offensive:
b. Defensive:
c. Special Operations:
6 TRAINING:
a. Individual:
b. Unit:
c. Specialized:
7 COMBAT EFFECTIVENESS:
a. Losses:
(1) Personnel :
(2) Equipment:
b) Replacements:
(1) Personnel:
(2) Equipment:
c Reinforcements:
(1) Personnel:
(2) Equipment:
(CLASSIFICATION)
Working Papers
Figure A-21. Sample blank tactical interrogation report (continued).
A-76
(CLASSIFICATION)
Working Papers
Date
d. Combat Experience:
e. Morale:
8. LOGISTICS:
a. Weapons and Ammunition:
(1) Weapons:
(2) Ammunition:
b. Vehicles and POL:
(1) Vehicles:
(2) POL:
c. Food and Water:
(1) Food:
(2) Water :
d. Communications Equipment:
e. Medical:
(1) Individual Equipment:
(2) Vehicular Equipment:
(3) Personnel:
(4) Facilities:
(5) Evacuation Procedures:
f. NBC Equipment:
( 1 ) Individual:
(2) Vehicular:
(CLASSIFICATION)
Working Papers
Figure A-21. Sample blank tactical interrogation report (continued).
A-77
(CLASSIFICATION)
Working Papers
Date
g. Specialized Equipment: (NOTE: If para 3.b. (8) was Unk or None,
DO NOT write this sub-para at all)
3 MISCELLANEOUS:
a. Personal ities:
Last name First name MN/I Rank P3N FUD
b. Code Names and Numbers:
(1) Code Names:
(2) Code Numbers:
c. Radio Frequencies and Call Signs:
(1) Radio Frequencies:
Radio Primary Alternate
(2) Call Signs:
Unit Primary Alternate
d. Passwords:
Challenge: Countersign:
(NOTE: If more than one password is known, use the following chart.!
Unit Challenge Countersign
e. Obstacles:
(1) Enemy:
(2) NATO:
f. PSYOPS :
(1) Enemy:
(2) NATO:
(CLASSIFICATION)’
Working Papers
Figure A-21. Sample blank tactical interrogation report (continued).
A-78
(CLASSIFICATION)
WORKING PAPERS
TACTICAL
INTERROGATION REPORT
NAME OF PRISONER:
BARANOV
INTERROGATOR:
CATEGORY: A
(B) C D
UNIT OR FORMATION TO WHICH INTG
ATTACHED: IPW See, 123d Ml Bn
23d Inf Div (Mech)
INTG SERIAL NO:
US-AR-2235-4A
MAPS USED: GERMANY, 1:50,000,
EISENACH-HUNFELD, USACGSC 50-242
DTG OF INTG: 181500 AUG 99
LANGUAGE USED: RUSSIAN
INTG REPORT NO:
104
INTERPRETER: NONE
PART I - INTELLIGENCE POTENTIAL OF ENEMY PRISONER OF WAR (EPW)
A. PERSONAL PARTICULARS:
1. Rank, full name, service number, and position:
JrSGT Boris Petrovich BARONOV, No, 0951046, driver
2. Date and place of birth: 16 JAN 78, BRYANSK, BySSR, USSR
3. Nationality: Soviet Ethnic: Ukrainian Religion: None
4. Knowledge of languages and proficiency: Ukrainian (N), Russian
(FL) .
5. Unit, formation or organization: Regt HQ, 61MRR, 56MRD
(HQ, 61MRR, 56MRD)
6. Date-time, place or grid references, capturing unit, and
circumstances of capture: 181300 AUG 99; NB621108; C Trp,
1st Sqdn, 8 ACR; surrendered to US Border Patrol .
B. CAREER :
1, Pre-military: Civilian Education: 10 yrs compulsory. No
vocational training. No civilian job. Paramilitary training:
Standard preinduction training.
(CLASSIFICATION)
WORKING PAPERS
Figure A-22. Sample completed tactical interrogation report.
A-79
(CLASSIFICATION)
WORKING PAPERS
2. Military: 21 months conscripted service. Military schools:
None. Previous job: None. Previous unit: None.
c. ASSESSMENT OF INTELLIGENCE VALUE :
1. Intelligence, experience, cooperation, reliability: Average, 3
years experience, cooperative, information checked against OB
holdings.
2. Specialist knowledge: None.
3. Discussion of approach techniques: Direction approach failed but
incentive approach was successful .
D. DOCUMENTS CARRIED AT TIME OF CAPTURE :
1„ List of documents: lx ID card no 0951046 (retained by EPW), lx
personal letter (returned to EPW), lx map section (evac to G-2)
2. Details of money and valuables: None
E. EQUIPMENT OF INTELLIGENCE INTEREST CARRIED AT TIME OF CAPTURE :
1. Personal Equipment: lx standard web gear, lx indiv first aid kit
(both destroyed in.place), lx SHM protective mask (retained by
EPW)
2. Weapons: lx 5.45rnn AK-74 assault rifle with 4x full mags
(120xrds) (all evac thru supply channels)
PART II - INFORMATION OBTAINED
A. SUMMARY :
DOI is 181300 AUG 99 unless otherwise indicated in the body of this
report.
B. TEXT :
1. MISSIONS
a. EPW
(CLASSIFICATION)
WORKING PAPERS
Figure A-22. Sample completed tactical interrogation report (continued).
A-80
(CLASSIFICATION)
WORKING PAPERS
("*) TOC: Waiting outside of gasthaus S of Spahl (NB6412) for PO,
61MRR, 56MRD and PO, 1MRB, 61MRR, 56MRD (IMRB, 61MRR, 56MRD)
for over an hour.
( 2 ) FUT: At 181330 AUG 99, was to drive PO, 61MRR, 56MRD and
PO, IMRB, 61MRR, 56MRD to a U/l unit 61MRR, 56MRD.
(Hearsay: PO, 61MRR, 56MRD. DOI: 181130 AUG 99).
(3) PA ST : Left CDP, 61MRR, 56MRD, located SE of Geismar (NB6515)
180800) AUG 99 and drove PO, 61MRR. 56MRD to CP, IMRB, 61MRR,
56MRD. Waited for PO, 61MRR, 56MRD about 3 hrs and at 181130
AUG 99 drove PO, 61MRR, 56MRD and PO, IMRB, 61, 56MRD to
gasthaus S of Spahl (NB6412). At 172330 AUG 99, left
assembly area, 61MRR, 56MRD and drove CO, 61MRR, 56MRD to CP,
61MRR, 56MRD arriving at 172345 AUG 99.
b. Unit: 61MRR, 56MRD
(1) PRES : Preparing men and equipment to advance W to Nusttal
(NB6010).
(2) FUT: Cross international Border and attack Nusttal (NB6010)
Nlt 190530 AUG 99. (Hearsay: PO 61MRR to PO IMRB, 61MRR;
DOI: 181130 AUG 99).
(3) - PAST: Moved into assembly area (exact location unk). 61MRR,
16 AUG 99.
c. Unit: IMRB, 61MRR, 56MRD
(1) ?RES : UNK
(2) FUT: u/l element MRB to secure road junction somewhere N of
Nusttal (NB601O) (exac loc unk). Road junction to be secured
NLT 190430 AUG 99. (Hearsay: PO IMRB to PO 61MRR; DOI
181130 AUG 99).
(3) PAST : UNK
2. COMPOSITION: (61MRR, 56MRD)
a. 61MRR had one HQ; three MRBs, dsg 1,2,3; one tk bn; one 122mm how
bn; one engr co; one recon co; one supply and svc pit; one med co;
one signal co
(Classification)
WORKING PAPERS
Figure A-22. Sample completed tactical interrogation report (continued).
A-81
(CLASSIFICATION)
WORKING PAPERS
b. Each MRB, 61MRR had one HQ; three MRC dsg 1,2,3; one mortar btry;
one commo pit
3. STRENGTH: (HQ, 61MRR, 56MRD)
a. Personnel : (HQ, 61MRR) - HQ, 61MRR had approx 65 pers
(UNK no off and EM)
b. Weapons and Equipment: (HQ, 61MRR)
(1) Individual Weapons: (HQ, 61MRR)
(a) UNK No x 9mm PM pistols (at least one ea off, HQ, 61MRR)
(b) UNK No X 5.45rrrn AK-74 assault rifles (at least one ea
UAZ-469 driver, HQ, 61MRR)
(2) Crew-Served Weapons: LINK
(3) Other Weapons: UNK
(4 Armored Vehicles: (HQ, 61MRR) - 2xBTR-70, armament UNK
(HQ, 61MRR)
(5 Other Vehicles: (HQ, 61MRR) - 3xUAZ-469 trk (one ea Regt
driver, HQ, 61MRR)
(6 Communications Equipment: (HQ, 61MRR)
(a) 3xR-130 transceiver (trans) (one ea UAZ-469 > HQ ’ 61MRR )
(b) 2xR-123 VHF trans (one ea BTR-70, HQ, 61MRR)
(7) NBC Equipment: (HQ, 61MRR)
(a) Individual: (HQ, 61MRR)
((I)) UNK no.xShM prot masks (ix ea lower EM, HQ,
61MRR)
. ((2) UNK no.xShMK prot masks (Ix ea off, Ix ea NCO,
HQ, 61MRR)
(CLASSIFICATION)
WORKING PAPERS
Figure A-22. Sample completed tactical interrogation report (continued).
A-82
(CLASSIFICATION)
WORKING PAPERS
((3)) UNK no.xOP-l prot clothing (one ea member, HQ,
61MRR)
(( 4 )) UNK no.xIPP indiv decon kits (one ea member, HQ,
61MRR)
(b) Vehicular: (HQ, 61MRR) - 3xDK-4K portable
decontamination sets (one ea UAZ-469 Trk, HQ, 61MRR)
(8) Specialized Equipment: UNK
4. DISPOSITIONS
a. CP, 61MRR, 56MRD loc vie NB665139 at intersection of 2xfarm roads
in forest SE of Geismar (NB6515). Collocated units: UNK.
Security measures: UNK no.x perimeter guards (FUD UNK). DOI:
180800 AUG 99.
b. Assembly area, 61MRR, 56MRD loc vie NB696163 (center of mass, and
measures Ikm N to S and E to W) SW of Kranlucken (NB7017).
Collocated units: None. Scty measures: UNK No x perimeter
guards (FUD UNK). DOI: 172330 AUG 99.
c. CP, 1MRB, 61MRR, F6MRD loc vie NB666156 at intersection of 2x farm
roads E of Geismar (NB6515). Collocated units: None. Security
measures: UNK. DOI: 181130 AUG 99.
d. DEPL, tk co (FUD UNK) loc vie from NB631104 to NB626104, along
farm road S of Reinhards (NB6210). Tanks engines were running
and were facing S. Collocate units and security measures: UNK.
cot: 181245 AUG 99
5. TACTICS: UNK
6. TRAINING: (61MRR, 56MRD)
a. Individual: (HQ, 61MRR) - The 3x regt drivers have been practicing
OPSEC (silence and no lights) while driving.
b. Unit: (61 MRR) - Extensive political training in the 61MRR for
the last month. (Hearsay: PO, 61MRR to PO, 1MRB, 61MRR. DOI:
181130 AUG 99.)
c. Specialized: UNK
(CLASSIFICATION)
_ WORKING PAPERS _
Figure A-22 Sample completed tactical interrogation report (continued).
A-83
(CLASSIFICATION)
WORKING PAPERS
7. COMBAT EFFECTIVENESS: (61MRR, 56MRD)
a. Losses : (61MRR)
(1) Personnel: (61MRR) - Since arriving in the border area
on 16 AUG 99, approx 20 training casualties have been evac to
the rear, (Hearsay: PO, 61MRR to PO, 1MRB, 61MRR. Dot:
181130 AUG 99).
(2) Equipment: (61MRR) - None
b. Replacements: (61MRR) None, but there was a replacement center
(FUD UNK) in “some large city”. (Hearsay: PO, 61MRR to PO, 1MRB,
61MRR. DOI: 181130 AUG 99).
c. Reinforcements: UNK
d. Combat Experience: (HQ, 61MRR) - Most of the officers in HQ,
61MRR have had experience in Afghanistan, but it is always
stressed that they were advisors and not fighters.
e. Morale: (HQ, 61MRR) - Officer morale is relatively high as they
enjoy field duty and are anxious to show CO, 61MRR that they are
proficient. Officers sometimes take their frustrations out on
lower EM, causing them to become angry and despondent.
8. LOGISTICS: (HQ, 61MRR, 56MRD)
a. ‘Weapons and Ammunit ion: (HQ, 61MRR)
(1) Weapons: (HQ, 61MRR) - All weapons are in good condition
due to recondit ioning in JUL 99 by maint unit (FUD UNK).
There are miscellaneous spare parts stored in each BTR-70.
Hearsay: BTR-70 driver, HQ, 61MRR. DOI: 171400 AUG 99.)
(2 Ammunition: (HQ, 61MRR) - No problems with any ammo. 300xrds
were issued for each AK-74 and 2 full mags (16xrds) for PM
pistol on 171400 AUG 99 at assembly area, 61 MRR U/l officer,
HQ, 61MRR.
b. Vehicles and POL: (HQ, 61MRR)
(CLASSIFICATION)
_ WORKING PAPERS _
Figure A-22. Sample completed tactical Interrogation report (continued).
A-84
(CLASSIFICATION)
WORKING PAPERS
(1) Vehicles: (HQ, 61MRR) - All vehicles are in good condition,
Drivers are constantly working on vehicles. Spare parts are
available from chief of Motor Transport, HQ, 61MRR on an as
needed basis, but all drivers steal parts from each other
occasionally. Tool kits are stored in each vehicle.
(2 POL: (HQ, 61MRR) - All vehicles were refueled at assembly
area, 61MRR 17 AUG 99, Additional fuel will be obtained ‘
from U/l tanker trucks, 61MRR after reaching Nusttal
(NB601O) (Hearsay: chief of Motor Transport, HQ, 61MRR.
DOI: 171800 AUG 99.)
c. Food and Water: (HQ, 61MRR)
(1) Food: (HQ, 61MRR) - 9 canned rations were issued to each
member, HQ, 61MRR at assembly area, 61MRR 171700 by chief of
Food Supply, HQ, 61MRR. After reaching NUSTTAL (NB601O),
members will be receiving more canned rations. CO and PO,
61MRR keep their canned rations and eat at gasthauses in
Spahl (NB6412).
(2) Water-: (hq, 61MRR) - U/l Water trailer (FUD UNK) at HQ,
61MRR supplies water as needed.
d. Communications Equipment: (HQ, 61MRR) - All commo equip was in
good condition as it was inspected by technical officer, 61MRR
171600 AUG 99 at assembly area, 61MRR.
e. Medical: (HQ, 61MRR)
(1) Individual Equipment: (HQ, 61MRR) - Each member was issued
lx U/l indiv first aid kit around the first week of AUG
(still sealed).
(2) Vehicular Equipment: (HQ, 61MRR) - Each vehicle had lx U/l
first aid kit.
(3) Personnel: UNK
(4) Facilities: UNK
(5) Evacuation Procedures: UNK
f. NBC Equipment: (HQ, 61MRR) - All NBC equip was in good condition
due to inspection by technical officer, 61MRR first week of
Aug 99.
(CLASSIFICATION)
_ WORKING PAPERS _
Figure A-22. Sample completed tactical Interrogation report (continued).
A-85
3. MISCELLANEOUS: (61MRR, 56MRD)
a. Personalities: (61MRR)
LAST NAME
FIRST NAME
MNI
RANK
PSN
FUD
OREKHOV
Nikolai
MNU
COL
CO
61MRR
MILENOVICH
Svetoslav
MNU
LTC
P0
61 MRR
GABOVICH
Vladimir
MNU
MAJ
TO
61 MRR
b. Code Names and Numbers: (61MRR)
(1) Code Name: (61MRR) - NOVY GOD
(2) Code Number: (61MRR) - QKN-854
cm Radio Frequencies and Call Signs: (61MRR)
(1) Radio Frequencies: (61MRR)
RAD 10 _ PR I MARY _ ALTERNATE
R-130 1.84 MHz 9.01 MHz
Radio frequencies are in effect 18 AUG 99 and are changed
daily at 2400 hrs IAW 56MRD CEOI.
(2) Call Signs:
(61 MRR)
UNIT
PR 1 MARY
ALTERNATE
Regt HQ, 61 MRR
ZHOLTAYA GORA
UNK
PO. 61 MRR
ZHOLTAYA GORA-2
UNK
Call signs are in effect 18 AUG 99 and are changed daily at
2400 hrs AW 56MRD CEOI.
d. Passwords (61MRR) - Challenge: ZNAMYA Countersign: VPERYOD
Passwords are in effect 18 AUG 99 and are changed daily at
2400 hrs AW 56MRD CEOI.
e. Obstacles UNK
f. PSYOPS: UNK
(CLASSIFICATION)
WORKING PAPERS
Figure A-22. Sample completed tactical interrogation report (continued).
A-86
BOMBING. SHELLING. AND MORTARING REPORTS
Bombing reports (BOMREPS), shell reports (SHELREPs), and mortar
bombing reports (MORTREPs) supply information on enemy bombing, shelling,
or mortaring activity. Submission is the responsibility of the affected
unit. Reports are handled as normal messages and are transmitted by the
fastest means available. Each transmission is preceded by the code word
“SHELREP” in the case of enemy artillery, by the code word “MORTREP” in
the case of enemy mortar or rocket fire, and by the code word “BOMREP” in
the case of an enemy air attack. The text of the message is transmitted
in the clear except for the unit identification and position of the
observer. A call sign is used in place of unit identification. The
observer’s position is encoded if it discloses the location of a
headquarters or an important OP. Figure A-23 shows the bombing, shell ing,
and mortaring report format.
A-87
(CLASSIFICATION)
A. UNIT OF ORIGIN, (use current call sign, address group or code name) .
B. POSITION OF OBSERVER (grid reference preferred--encode if this
discloses the location of a headquarters or important OP, or if
subparagraph F2, below, is used to give information on location).
c. DIRECTION AND ANGLE OF FALL OR DESCENT, (direction and bearing of
flash, sound, or groove of shell (state which) is measured clockwise from
grid north in mils, unless otherwise specified, The angle of fall or
descent may be determined by placing a stick or rod in the fuze tunnel and
measuring in roils, Unless otherwise specified, the angle formed by the
stick or rod in relation to the horizontal plane).
D. TIME FROM.
E. TIME TO.
F. AREA BOMBED, SHELLED, ROCKETED, OR MORTARED, (may be sent either as«
L Grid reference (clear reference is to be used).
OR
2. Direction measures clockwise from grid north to impact points
(degrees or rnils--state which) and distance in yards or meters (state
which) from observer. This information must be encoded. When this method
is used, maximum possible accuracy is essential) .
G. NUMBER AND NATURE OF GUNS, MORTARS, ROCKET LAUNCHERS, AIRCRAFT, OR
OTHER METHODS OF DELIVERY.
H. NATURE OF FIRE, (adjustment, bombardment, harassing) (may be omitted
for aircraft) .
I. NUMBER, TYPE AND CALIBER, (state whether measured or assumed) of
shells, rockets (or missiles) , and bombs.
J. TIME FROM FLASH TO BANG, (omit for aircraft).
F. DAMAGE, (encode if required).
NOTE: JCS Publication 12, page 14, requires an additional message
indicator item. This item identifies the report being sent as a shell,
bomb, or mortar report. It generally follows the unit of origin item in
the message format.
(CLASSIFICATION)
Figure A-23. Format for BOMREP, SHELREP, or MORTREP reports.
A-88
NBC ATTACK REPORTS
NBC attack report formats are used according to the provisions of
STANAGS 2103 and 2104 and FM 3-3 to report NBC attacks and the resulting
NBC hazardous areas. Chemical and radiological hazardous areas resulting
from nuclear and chemical attack by friendly forces are also reported
using these formats. These reports are—
0 NBC-1. Report used by the observing unit to give initial and
subsequent data of an enemy chemical, biological, or nuclear
attack.
0 NBC-2. Report used for passing evaluated data of a chemical,
biological, or nuclear attack.
® NBC-3. Report used for immediate warning of expected NBC
contamination or hazardous area.
0 NBC-4. Report used for radiation dose-rate measurements and
detection of chemical or biological contamination.
0 NBC-5. Report used to locate the area of NBC contamination or
hazard .
0 NBC-6. Report used to detail information on chemical or biological
attacks.
NBC-1 and -4 reports are prepared by the unit under attack or a unit
observing an attack. These reports are submitted through cormmand,
intelligence, or FA communications channels to the designated headquarters
TOC by the fastest means available. Initial enemy use of NBC weapons is
always reported to the theater commander, through the chain of command, by
the fastest means with a FLASH message precedence.
The information source for nuclear attack reports is normally the
headquarters of an FA or AD unit (other units may also be designated as
collection and reporting agencies). These units submit—
'An initial NBC-1 nuclear report to the unit’s next higher
headquarters with a FLASH message precedence.
"Subsequent NBC-1 nuclear reports, which are transmitted to the
unit's next higher headquarters, with an IMMEDIATE message
precedence, giving follow-up data.
The information source for chemical and biological attack reports is
normally the headquarters of a company or independent platoon. It
submits—
A-89
'An initial NBC-1 chemical or biological report, to its next higher
headquarters, with a FLASH message precedence. The next higher
headquarters forwards the initial NBC-1 chemical or biological
report through command channels, to the NBC collection center, with
the same message precedence.
"Subsequent NBC-1 chemical or biological reports, to the unit’s
next higher headquarters, with an IMMEDIATE message precedence,
giving follow-up data. The next higher headquarters forwards
subsequent NBC-1 chemical or biological reports through command
channels, to the NBC collection center, with the same message
precedence.
NBC COLLECTION CENTER
The NBC collection center is normally the nuclear, biological, and
chemical element (NBCE) of the TOC at division. It consolidates NBC-1
nuclear, biological, or chemical reports of the same attack received from
its various information sources and transmits an NBC-1 report to the NBC
control center, normally the TOC at field army headquarters. It transmits
appropriate NBC-2, -3, and -5 reports to subordinate, adjacent, and higher
commands. If there is no NBCE, the G3 assumes these responsibilities.
NBC CONTROL CENTER
The NBC control center is normally the NBCE of the tactical operations
center at field army. It consolidates and evaluates NBC reports received
from subordinate commands and USAF, Marine Corps, and civilian
installations and agencies. It directs reconnaissance and survey efforts;
transmits evaluated NBC data to subordinate commands and adjacent area
commands; and submits appropriate reports to higher headquarters, adjacent
commands, and national agencies. If there is no NBCE, the G3 assumes
these responsibilities.
NBC-1 REPORTS
NBC-1 reports follow the same format as SHELLREPs, MORTREPS, and
BOMBREPs. The words “Type of Report,” and the letters “B,” “ D,” “ H,” or
either “C or “F" always are reported. Other items are optional. Table
A-3 shows the letter explanation for NBC-1 reports. Table A-21 shows the
master list of available letters.
Table A-3. Letter explanation for NBC-1 report.
EXAMPLE
EXAMPLE
EXAMPLE
LETTER
MEANING
NUCLEAR
CHEMICAL
BIOLOGICAL
Precedence data and Uma (local or Zulu
Uma, stata which)
Security classification
From
To
Type of Report
NBC 1 (NUCLEAR)
NBC 1 (CHEMICAL)
NBC (BIOLOGICAL)
■
Strike serial number (If known—at assigned by
the NBCE at the operations canter responsible
for the areas In which the strike occurs).
A. 04
A. 02
l_!_l
Position of observer (UTM or place).
LB 196400
B. Manila
A-90
Table A.-& Letter explanation tor NBC-1 report (continued).
Direction moasurod clockwise from or magnetic C. Grid 060
north (state which) of the attack from Degrees
observer (degrees or mils, state which).
Date and time of denation or date and time
attack started (local or Zulu time, state which).
Illumination time (seconds) or time attack
ended (local or Zulu, state which).
Location of attack (UTM or place) or area
attacked (actual or estimated, state which).
Means of delivery. If known.
Type of burst—air, surface or unknown (state
which)—Including height, if known; type of
agent. If known (chemical or biological);
or type of attack (chemical or biological).
Type and number of munitions or aircraft
(state which).
Flash-to-bang time (seconds).
Crater present or absent and diameter If known
(meters).
Nuclear burst angular cloud width measured at L. 280 mils
5 minutes after the detonation (degrees
or mils, state which).
(Do not report If date Is obtained more than
5 minutes after the detonation).
StabSized cloud-top angle and cloud-bottom
angle (state which) or cloud-up and
cloud-bottom height (slate which)
measured at H+10 minutes (degrees,
mils, meters, or feet—state which).
Date-time of reading or date-time
contamination Initially detected (chemic a l
or biological). State whether local
or Zulu time.
Located area of contamination (UTM).
NOTE:
When the contaminated area is a
complete circle, the first coordinate
w6l be repeated as a last coordinate
A-91
Table A-4. Initial nuclear report example.
(CLASSIFICATION)
FLASH Mima ROMEO
UNCLASSIFIED
FROM REDDOG TO AMIGO
NBC-1 NUCLEAR
BRAVO SHACKLE DELTA HOTEL BRAVO
UNSHACKLE
CHARLIE GRID 162 MILS
DELTA CHM07 ROMEO
HOTEL SUR r ACE
JULIET bC
END OF MESSAGE
(CLASSIFICATION)
Table A-5. Initial chemical report example.
(CLASSIFICATION)
FLASH
20140& HOTEL
FROM (27ROb
TO EHZ03
NBC-1 CHEMICAL
BRAVO MARVILLE
DELTA 2I314CS HOTEL
FOXTROT LIMA BRAVO 2DS3GS
ESTIMATED
GOLF ARTILLERY
HOTEL AIR
(CLASS IF I CAT!ONj
A-92
Table A-6. Subsequent NBC-1 nuclear report example.
(CLASSIFICATION)
IMMEDIATE 0^0R13 ROMEO
UNCLASSIFIED
FROM REDDOG TO AMIGO
NBC-1 NUCLEAR
BRAVO SHACKLE DELTA HOTEL BRAVO
UNSHACKLE
CHARLIE GRID 162 MILS
DELTA mmC7 ROMEO
HOTEL SURFACE
LIMA 26C MILS
END OF MESSAGE
(CLASSIFICATION)
Table A-7. Subsequent NBC-I chemical report example.
(CLASSIFICATION)
IMMEDIATE
201436 HOTEL
FROM c3?R0b
TO E4203
NBC-1 CHEMICAL
ALPHA 02
ECHO 2G14G5 HOTEL
HOTEL NERVE
(CLASSIFICATION)
A-93
NBC-2 REPORTS
NBC-2 reports are used for passing evaluated data of an NBC attack.
They are normally based on two or more NBC-1 reports and include an attack
location and in the case of a nuclear detonation, an evaluated yield.
Tables A-8 and A-9 show examples of NBC-2 (nuclear) and NBC-2 (chemical)
report messages.
Table A-8. NBC-2 nuclear report example.
(CLASSIFICATION)
E4Z03E4Z03
IMMEDIATE NBC-2
FROM (37J04
ALFA/NQ01
201405 ZULU
FOXTROT LIMA BRAVO lfl74flb
HOTEL SURFACE
NOVEMBER 50
YANKEE/050/01Z KPH
(CLASSIFICATION)
Table A-9. NBC-2 chemical report example.
(CLASSIFICATION)
E4Z03E4Z03
IMMEDIATE NBC-2
FROM (37J04
2D0T45Z
FOXTROT LIMA BRAVO 12b45bZ
HOTEL NERVE
(CLASSIFICATION)
NBC-2 reports include the attack time, location, and, in the case of a
nuclear detonation, an evaluated yield. Letters “A,”’ “D,”’ “F,” “H,” and
“N”” are repeated as often as necessary to produce a summary report. Other
letters may be added; however, the letters mentioned must be included in
the report. Table A-10 shows the letter explanation for NBC-2 reports.
A-94
Table A-10. Letter explanation for NBC-2 report.
LETTER MEAN ING EXAMPLE
NUCLEAR
EXAMPLE
CHEMICAL AND BIOLOGICAL
Precedence
Date-time (local or Zulu
time, state which)
Security Classification
From
To
Type of Report NBC-2 (NUCLEAR) NBC-2 (CHEMICAL)
A. Strike serial number
24
D. Date-time of detonation 201405 Zulu 200945 (local)
or date-time attack
started (local or Zulu
time, state which).
F. Location of attack (UTM LB 187486 LB 126456 actual
or place) or area actual
attacked (actual or
estimated, state which) .
G, Means of delivery, if known.
H. Type of burst--air, surface, Surface Nerve
or unknown (state which)—
including height, if known;
type of agent, if known;
(chemical or biological);
or type of attack (chemical
or biological).
N. Estimated yield (kt). 50
A-95
NBC-3 REPORTS
NBC-3 reports provide irrmediate warning of expected NBC contamination
or hazardous areas. Tables A-11 and A-12 show examples of NBC-3
(chemical) and NBC-3 (nuclear) messages.
TableA-ll. NBC-3 nuclear report example.
(CLASSIFICATION)
ASZOIE3Z05
intlEDIATE NBC-3
FROM R4t30b
DELTA EQ140Z
FOXTROT LIMA BRAVO l&74fib
HOTEL SURFACE
PAPA ALPHA-
LIMA BRAVO I'mEO
LINA BRAVO ED044D
LINA BRAVO E55410
LINA BRAVO E574S7
YANKEE DE7E-D31E DEGREES
ZULU Dn-QES-DS
(CLASSIFICATION)
Table A-12. NBC-3 chemical report example.
(CLASSIFICATION)
ASZOIEEZOE
INNEDIATE NBC-3
FRON R4(20b
DELTA ED141SZ
FOXTROT LINA BRAVO EDb3DQZ
HOTEL BC GB
PAPA ALPHA LINA BRAVO EDfl3E0n LINA BRAVO
E103E0i LINA BRAVO EQbl3Di LINA
BRAVO SD431D
(CLASSIFICATION)
A-96
Table A-13 explains the letters in the NBC-3 nuclear and chemical
report examples, Other letters from the master list, are added at the
users’ discretion.
NOTE: When the effective windspeed is less than 8 kph, the NBC-3 report
consists of the letters “D,”’ “F,’ and “Z.” “Z” contains three digits
only, (the radial distance of zone I).
Table A-13. Letter explanation for NBC-3 reports.
LETTER
MEANING
EXAMPLE
NUCLEAR
EXAMPLE CHEMICAL
AND BtOLOGICAL
Precedence
Date-lime (local or
Zulu time, state which)
Security Classification
From
To
Type of Report
NBC 3 (NUCLEAR)
NBC (CHEMICAL AND
BIOLOGICAL)
A.
Strike serial number.
A. 24
A. 3
D.
Date-time of detonation or
date-time attack started (local
or Zulu time, state which).
D. LB 201405 Zulu
D. 201405 (local)
F.
Location of attack (UTM or place)
or area attacked (actual or
estimated, state which).
F. LB 187486 actual
F. LB 206300 actual
P.
Areas of expected contamination
(UTM).
P. LB 208320 LB 206310
LB 210320 LB 204310
Y.
Direction measured clockwise, from
grid north, to the left and then to
the right radial lines (degrees or
mils, state which) (4 digits each).
Y. 0272-0312 degrees
Z.
Effective windspeed (kph), 3 digits;
downwind distance of zone 1 (km);
3 digits; cloud radius (km), 2 digits.
(When effective windspeed is less
than 8 kph, use 3 digits only for
radial distance zone 1).
Z. 019-025-05
A-97
NBC-4 REPORTS
NBC-4 reports are used to transmit radiation dose-rate measurements.
Tables A-14 and A-15 show examples of NBC-4 radiation dose-rate messages.
Table A-14. NBC-4 report example 1.
(CLASSIFICATION)
E4Z03 E4Z03
IMMEDIATE NBC-4
FROM (37ROb
201745 HOTEL
flUEBEC LIMA BRAVO 123^67
ROMEO 35 INITIAL
SIERRA 201735 HOTEL
(CLASSIFICATION)
Table A-15. NBC-4 report example 2.
(CLASSIFICATION)
REDDOG 3 REDDOG 3
IMMEDIATE NBC-4
FROM ALFA
201745 HOTEL
QUEBEC LIMA BRAVO 123^7
ROMEO 1 INITIAL
SIERRA 201735 HOTEL
(CLASSIFICATION)
A-98
Table A-16 explains the items in the examples for NBC-4 nuclear and
chemical report formats. The letters “Q,”’ “R,” and “S” are repeated as
often as necessary. Users of NBC-4 reports are not confined solely to the
use of the letters shown in the examples; other letters from the master
list, (see table A-21), are added at the users’ discretion.
NOTE: Radiation dose-rates are measured in the open, one meter above the
ground. Other conditions are specified in the message as part of line
ROMEO .
Table A-16. Explanation of letters for NBC reports.
LETTER MEANING EXAMPLE
Precedence
Date-time (local or Zulu time, state
which)
Security Classification
From
To
Type of Report NBC-4 (NUCLEAR)
Q. Location of reading (UTM) Q. LB 123987
R. Dose-rate (cGy/hr)
(this is NOT normalized
to H + 1 hour). The words
“initial,”’ ‘ increasing, ”
“peak,”’ or “decreasing,”
may be added (correlation
factor information is
included if shielded dose-
rate readings are reported).
s. Date-time of reading
(local or Zulu, state which)
S. 201735 (local)
Q. LB 129965
R. 60
S. 201650 (local)
Q. LB 146808
R. 27 INCREASING
S. 201710 (local)
A-99
NBC-5 REPORTS
NBC-5 reports identify the area of contamination or hazard. Tables
A-17 and A-18 show examples of an NBC-5 report messages.
Table A-17. NBC-5 nuclear report example.
(CLASSIFICATION)
ASZ0IE3Z0E
IMMEDIATE NBC-5
01M13 GOLF
FROM REDDOG
TO AMIGO
NBC-5 NUCLEAR
TANGO E01505Z
VICTOR NOVEMBER DELTA b51455
510510
asms 1 )
bS145S
WHISKEY NOVEMBER DELTA bQ471fl
'mbfib
11M MED
5T5007
(CLASSIFICATION)
Table A-18. NBC-5 chGmical report example.
(CLASSIFICATION)
ASZOIEEZOE
IMMEDLATE NBC-5
SIERRA EQOflOOOZ
TANGO EQ104SZ
EXRAY CHEM NOVEMBER
DELTA EQbTO
E01575
ED07&7
EQbTIl
(CLASSIFICATION)
A-100
The NBC-5 report is most useful when sent as a map trace or overlay
(if time and distance permit). When the contamination arises from a
single threat or unidentified nuclear burst, the dose-rate always refers
to H+1 hour, and the letter “’T” is used. When there have been several
nuclear detonations at different times or on different days and no single
H + 1 hour is possible, the dose rates are reported as a specified item
using the letter “’O.” Letters “O” and “T” are, therefore, alternatives;
both cannot be used in the same report. Table A-19 explains the letter
designations used in NBC-5 reports.
NOTE: When requested decay rates are to be transmitted, use the letter
“R. “
Table A-19. Letter explanation for NBC-5 reports.
LETTER
EXAMPLE
NUCLEAR
EXAMPLE
CHEMICAL AND BIOLOGICAL
Precedence
Date-time (local or
Zulu time, state
which)
Security Classification
From
To
Type of Report
NBC-5 (NUCLEAR)
NBC-5 (CHEMICAL and
BIOLOGICAL)
A. Strike serial
numbers causing
contamination
(if known)
A. 24
A. 1
o. Reference date-time
for estimated contours
(see note ( 2) above)
when not H+1 hour
s. Date-time contamination
initially detected
(chemical or biological
(local or Zulu time,
state which)
S. 200800 (local)
A-101
Table A-19. Letter explanation for NBC-5 reports (continued).
T. H + 1 date-time or T. 201505 ZULU T. 201045 (local)
date-time of latest
reconnaissance of
contamination in the
area (chemical or
biological). State
whether local or Zulu time.
u.
1,000 cGy/hr
contour 1 ine coordinates
V.
300 cGy/hr contour
V. ND
651455
line coordinates
ND
810510
ND
821459
ND
651455
w. 100
cGy/hr contour
W. ND
604718
line
coordinates
ND
991686
ND
114420
ND
595007
x. 20 cGy/hr contour
line coordinates,
or located area of
contaminant ion
(chemical or biological)
X. CHEMICAL
ND 206991
ND 201575
ND 200787
ND 206991
Figure A-24 shows a current example of the estimated radiological
contamination trace (dose-rate type) format. It is not necessary, or even
desirable, to report all four of the contours for different dose rates.
Four are given to provide flexibility. (In the example, only two are
reported.) When a contour closes to form a complete ring, the first
coordinate is reported at the end. The following are colors used for
plotting and sending the report as a trace:
“Red for 1 ,000 cGy/hr.
“Green for 300 cGy/hr.
“Blue for 100 cGy/hr.
“Black for 20 cGy/hr,
A-102
Yellow is used for chemical and biological contamination or hazardous
areas. Additional letters, including those shown in the examples in Table
A-19, are used. Letters from the master list in Table A-21 are added at
the users’ discretion.
MAP .
SCALE.
B
GZ
»
X
HO—Inf Dlv
Nuclear Bunt (30 KT)
GZ MN 671355
H-hour 170500Z
Standard Decay (R + 12)
Prepared 171130Z
Do not use after 171600Z
10 cGy/hr at H + 1
A. 10 cGy/hr at H + 7
10 cGy/hr at H +11
B. 30 cGy/hr at H + 7
30 cGy/hr H+11
C. lOOcGy/hratH + 7
A-103
NBC-6 REPORT
NBC-6 reports are used to summarize information concerning a chemical
or biolog ical attack. Table A-20 shows an NBC-6 biological report.
Table A-20. NBC-6 biological report.
ALFA
coo 1
DELTA
200430Z
ECHO
200435Z
FOXTROT
LBZ00300 to LB208304 Actual
GOLF
Aerial spray
HOTEL
Toxin
INDIA
2 Aircraft
KILO
Rolling hills, mostly open
MIKE
Enemy broke contact just before
attack, then bypassed on right
f 1 ank
the
QUEBEC
Soil sample taken at LB200300
YANKEE
Downwind direction 270 degrees,
speed 015 kph
wind
ZULU BRAVO
This is the only biological attack
in our area
The NBC-6 report is a narrative description of chemical and
biological attacks that have occurred in a unit's AO. It is designed to
be developed at battalion level and above. It contains as much
information as is known about the attacks. It is submitted only when
requested and is usually sent in hard copy.
A-104
MASTER LIST
Table A-21 shows the master list of letters that is applicable to
all types of NBC reports. Each letter is annotated. Care should be taken
to ensure that letters mandatory for each NBC report are incorporated
before adding letters to the reports, overlays, or traces.
Table A-21. Master list of letters.
LETTER MEANING MEANING
NUCLEAR REPORTS
A. Strike serial number(s).
B. Position of observer (UTM or
place) .
c. Direction measured clockwise
from grid or magnetic north
(state which) of the attack
from observer (degrees or
roils, state which).
D. Date-time of detonation (local
or Zulu time, state which) .
If local time is used, give
the letter of the local time
zone, i f -known. See
FM 101-10-1 for time-zone charts.
If the local time is used and
the time-zone letter is not
known, the word “local” will
be transmitted with this
itern.
E. Illumination time. (Report
only when other data are not
available. Report in
seconds.)
F. Location of attack (UTM or
place) (actual or estimated,
state which).
G. Means of delivery, if known.
H. Type of burst--air, surface,
or unknown, state which--
including height, if known.
I. (This letter item is not used
for nuclear report.)
J. Flash-to-bang time (seconds).
K. Crater present or absent and
diameter, if known (meters) .
CHEMICAL OR BIOLOGICAL REPORTS
Strike serial number(s).
position of observer (UTM) or
place) .
Direction measured clockwise from
grid or magnetic north (state
which) of the attack from
observer (degrees or roils, state
which) .
Date-time attack started (local
or Zulu time, state which). If
local time is used, give the
letter of the local time zone,
if known. See FM 101-10-1 for
time-zone charts. If the
local time is used and the
time-zone letter is not known,
the word ‘“local, ” will be
transmitted with this item.
Time attack ended (local or Zulu,
state which).
Area attacked (actual or
estimated, state which).
Means of delivery, if known.
Type of agent, if known (chemical
or biological). Type of attack
(chemical or biological).
Type and number of munitions or
aircraft (state which).
A-105
Table A-21. Master list of letters (continued).
LETTER MEAN ING
NUCLEAR REPORTS
L. Nuclear burst angular cloud
width measured at 5 minutes
after the detonation
(degrees or roils, state which).
(Do not report if data is
obtained more than 5 minutes
after the detonation.)
M. Stabilized cloud-top angle
and cloud-bottom angle
(state which) or cloud-top
height and cloud-bottom
height (state which)
measured at H+10 minutes
(degrees, roils, meters, or
feet--state which).
N. Estimated yield (kt).
O. Reference date-time for
estimated contours when
not H + l hour.
P. For radar purposes only:
P.A. UTM coordinates of points
to outline external
contours of radioactive
clouds.
P.B. Effective wind direction
(direction from which the
wind is blowing) in
degrees or roils (state
which) .
Q. Location of reading (UTM).
R. Dose-rate (cGy/hr). The
words “initial, ”
“ increasing,’” “peak.”
or “decreasing” may
be added.
s. Date-time of reading (local or
Zulu time, state which).
T. H + l date-time (local or Zulu
time, state which).
u. 1,000 cGy/hr contour line
coordinates (UTM) (red).
v. 300 cGy/hr contour line
coordinates (UTM) (green).
MEAN ING
CHEMICAL OR BIOLOGICAL REPORTS
Area of expected contamination
(UTM).
Date-time contamination initially
detected (local or Zulu time,
state which).
Date-time of latest reconnaissance
of contamination in the area
(local or Zulu time, state which).
A-106
Table A-21. Master list of letters (continued).
LETTER MEAN ING
NUCLEAR REPORTS
W. 100 cGy/hr contour line
coordinates (UTM) (blue),
x. 20 cGy/hr contour line
coordinates (UTM) (black).
Y. Direction measured clockwise
from grid north to the left
and then to the right radial
lines (degrees or roils, state
which--4 digits each),
z. Effective windspeed (kph), 3
digits; downwind distance of
zone I (km), 3 digits; cloud
radius (km), 2 digits. (When
effective windspeed is less
than 8 kph, the NBC-3 report
will contain only three
significant digits, that is,
the radial distance of zone I.)
MEAN ING
CHEMICAL OR BIOLOGICAL REPORTS
Located area of contamination (UTM)
(yellow).
A-107
ANALYSIS OF AREA OF OPERATIONS
Figure A-25 shows a completed sample and explanation of analysis of
the area of operations. The following paragraphs are keyed to paragraphs
in the sample.
1. PURPOSE AND LIMITING CONSIDERATIONS. State the purpose of the
analysis and define the area that is being analyzed. Include a statement
of the mission of the command and other considerations that limit the
applicability of the analysis. Include the commander’s plan of action and
enemy capabilities.
2. GENERAL DESCRIPTION OF THE AREA.
a. Climatic or Weather Conditions. This paragraph lists items of
weather information that have military significance. Throughout the
remainder of the analysis, weather information is interpreted as to its
operational effects. For example, winds at low temperatures are
interpreted in terms of the wind chill factor and the resulting effects on
operations, such as attack or defense which must face the prevailing
winds, or the use of open or closed storage facilities.
Light data is always reported to assist in selecting courses of action
and the conduct of mil itary activities.
The BMNT and the EENT are the beginning and end, respectively, of
enough light for limited visibility. The BMCT and the EECT are the
beginning and end, respectively, of adequate light for large-scale
operations.
Moon phases and other phenomena, like atmospheric conditions and star
brilliance, also influence night operations. During full moonlight,
conditions of visibility sometimes approach those of daylight. Such
conditions need to be anticipated as they influence friendly and enemy
courses of action such as attacks, patrolling, and changes in
dispositions.
b. Terrain.
(1) Relief and Drainage System, Drainage and ridge lines are
basic elements in studying terrain, as they clearly indicate the general
shape of the ground. A complete study of relief and drainage includes
detailed information about slope, configuration, elevation of ground
forms; and depth, width, tide data, and conditions of banks and bottoms of
streams and rivers. These items are portrayed graphically on maps.
(2) Vegetation. Vegetation studies are best presented in the
form of tinted, or otherwise marked, overlays. Considerations include
locations of trees, diameters of trunks, density, ground cover or canopy,
undergrowth, and types of natural and cultivated vegetation in nonwooded
areas.
A-108
(3) Surface Materials. Surface materials are best presented on
colored or marked overlays. Soil maps made by the agricultural services
of various countries are particularly valuable. The information contained
in soil maps frequently is translated into a trafficability map and a map
of areas susceptible to high levels of induced radioactivity. A
trafficability map based on weather forecasts are colored or marked to
indicate degrees of trafficability effectively shows areas suitable for
cross-country movement.
(4) Artificial Features, Artificial features of potential
military significance include roads, railroads, bridges, tunnels, mines,
towns, industrial areas, and fortifications. The features are best
represented on maps or marked overlays.
c. Additional Characteristics. Only those characteristics--
sociology, politics, economics, transportation, manpower--which influence
the choice of a course of action by either force are included. Lengthy
data is presented in an annex, preferably in tabular form.
3. MILITARY ASPECTS OF THE AREA. The facts listed in paragraph 2 are
analyzed and their influence on tactical and CSS factors that are
considered in the selection of a course of action by either force are
determined. In the analysis of these factors, the effects of and on
nuclear fires, chemical and biological agents, and important devices and
equipment used in implementing courses of action are integrated, as
appropriate. The tactical aspects of observation and fire, concealment
and cover, obstacles, key terrain features, AAs, and the CSS aspects are
discussed in the following paragraphs.
a. Tactical Aspects.
(1) Observation and Fire.
(a) Observation depends on condit ions of terrain which
permit a force to locate the enemy, either visua I ly or through the use of
surveillance devices. The highest terrain in an area usually provides the
best observation. The increased use of equipment with LOS characteristics
requires the availability of suitable terrain features for sighting
purposes; while at same time, the capability of employing organic aerial
platforms reduces the requirement to use such terrain. Dust clouds caused
by nuclear blast reduce electronic LOS. Other limits to observation
include darkness and tall vegetation (woods and jungle canopy). The
effects of visibility on observation are analyzed along with weather
conditions.
A-109
(b) Fire, as used in the analysis of the battlefield area,
includes the FofFs of all weapons and characteristics of weapons del ivery
systems affected by weather and terrain. For example, gusty surface winds
affect the use of projectiles. High, irregular terrain features or the
absence of overhead mass clearance limit FofFs. A FofF is an area that
weapons can cover effectively with fire from given positions. Although
observation is essential to effective control of fire, the best
observation does not always guarantee the best FofF. An ideal FofF for
flat-trajectory weapons is an open area in which the enemy can both be
seen and has no protection weapons fire.
(2) Concealment and Cover.
(a) Concealment is protection from observation. It is
provided by woods, underbrush, snowdrifts, tall grass, cultivated
vegetation, darkness, smoke, dust, fog, ground haze, rain, or falling
snow.
(b) Cover is protection from the effects of direct and
indirect fires. It is provided by ditches, quarries, caves, riverbanks,
folds in the ground, shell craters, buildings, walls, railroad embankments
and cuts, sunken roads, and highway fills. Defiladed areas which provide
protection against some types of weapons do not necessarily protect
against effects of nuclear fires. Unless the forward slopes of a terrain
mass are very steep, nuclear blast will affect personnel and material on
the reverse slope because the blast wave follows the configuration of all
but the most rugged terrain. When a nuclear weapon is fired over a deep
val ley, or the valley axis points toward ground zero, the blast effects
are canal ized, increasing the damage. Irregular terrain provides some
cover from thermal radiation of nuclear fires. Few buildings are
sufficiently strong to withstand all effects of blast or, if not damaged
or destroyed by blast, to be unaffected by thermal radiation. Foxholes,
bunkers, and tunnel-type shelters offer the simplest forms of effective
cover.
(c) Concealment and cover are desirable for both the attack
and the defense. If troops move forward under the concealment of woods,
fog, or a moonless night, the chances of achieving surprise are greater.
If troops move protected from the enemy’s fire by ditches, embankments, or
walls, the attack is more effective. In a defensive situation, friendly
forces seek to defend in an area which offers both concealment and cover
but does not provide covered approaches for the enemy.
(d) The mobility of the command is considered in determining
avai lable concealment and cover. Concealment and cover are desirable
during troop movements by any means. Routes which afford good concealment
and cover reduce the vulnerability of a moving force to detection and to
destruction by fire.
A-110
(3) Obstacles.
(a) An obstacle is any natural or artificial terrain feature
which stops, impedes, or diverts military movement. Natural obstacles
include rivers, streams, canals, lakes, swamps, cliffs, steep slopes,
dense woods, jungles, deserts, mountains, cities, and certain types of
unstable soil . Artificial obstacles are works of construction and
destruction executed to stop or impede military movement. They include
minefield, craters, antitank ditches, trenches, abatises, roadblocks,
deliberately flooded areas, areas contaminated with chemical and
biological agents, extensive rubble, forest fires, trees blown down, and
areas contaminated with residual nuclear radiation.
(b) To be fully effective, obstacles are covered by
observation and fire. However, even undefended obstacles may canal ize an
attacker into concentrations which are easier to detect and which are
suitable for nuclear attack. Obstacles perpendicular to a direction of
attack favor the defender by slowing the enemy, forcing the enemy into
concentrations that tend to occur while crossing obstacles, and holding
the attacker for a longer time under the effective fires of the defense.
Obstacles parallel to an axis of advance give the attacker flank
protection. However, parallel obstacles interfere with lateral movement
and coordination.
(c) The mission of the command influences consideration of
obstacles. In the defense, the intelligence officer identifies as
obstacles those features of the terrain which stop, impede, or divert
military movement into, out of, or within the area encompassed by the
FEBA, lateral boundaries, and the rear boundary (prescribed or assumed).
In the attack, the intelligence officer considers the obstacles from the
line of departure to the objective (both inclusive) , bounded laterally by
the assigned or assumed operational zone.
(4) Key Terrain Features.
(a) A key terrain feature is any loca I ity or area whose
seizure or control affords a marked advantage to ei ther opposing force.
Key terrain features are selected to indicate areas and local ities whose
seizure or control are considered in formulating and selecting courses of
action. The selection is based on the level of command, type of unit, and
mission of the command. Key terrain which would give us a marked
advantage in the accomplishment of our mission is selected. If it is
seized or control led by the enemy, it would delay the accomplishment of
our mission. For example, a bridge over an unfoldable river gives access
to the opposite shore without requiring an assault crossing, Control of a
road or rail center reduces the enemy’s ability to resist our advance. A
level clearing in rough terrain is the only accessible landing field for
airmobile operations.
A -111
(b) Key terrain varies with the level of command. For
example, to an army commander, a large city affords marked advantages as a
communications center. To a division commander, the high ground which
dominates the city is more important, and the city itself is an obstacle,
(c) Obstacles are rarely key terrain features. The high
ground dominating a river, rather than the river itself, is usually the
key terrain feature for the lower unit commander. An exception is an
obstacle like a built-up area, which is assigned as an objective to a
force; the obstacle then becomes key terrain to the force ordered to
capture it.
(d) Key terrain, in addition to influencing mission
accomplishment, is also highly significant in applying combat power.
Control is not ensured only by seizure and occupation. Seizure and
physical occupancy of key terrain features by relatively large forces may
not be desirable, Destructive fires delivered by long-range means can
destroy forces physically occupying key terrain. The commander controls
key terrain to avoid destruction of force while keeping the enemy from
gaining control. Control includes maneuver, surveillance, security, and
use of fires. Terrain which permits or denies maneuver is key terrain.
Tactical use of terrain often is directed at increasing the capability for
applying combat power and, at the same time, forcing the enemy into areas
which result in reduction of the enemy's abil ity to apply combat power.
Terrain which permits this also is key terrain. The effects of terrain on
maneuver, appl ication of combat power, and preservation of force integrity
are considerations in selecting and controlling key terrain and its
tactical use.
(e) In the offense, key terrain features are usually forward
of the friendly dispositions and are often assigned as objectives.
However, terrain features in adjacent sectors are key terrain if their
control is necessary for the continuation of the attack or the
accomplishment of the mission. If the mission is to destroy enemy forces,
terrain is selected whose seizure helps ensure the required destruction.
Terrain which gives the enemy effective observation along an axis of
advance to be used by the friendly forces is key terrain if the enemy must
be denied its possession or control. Key terrain is within friendly
territory when its control is essential to the success of an offensive
operation. For example, if the enemy attacks before friendly forces
attack, the control of this terrain is essential because it affords a
marked advantage. Thus, it is a key terrain feature.
In the defense, key terrain is usually within the assigned sector and
within or behind the selected defensive area. Some examples of key
terrain are--
"Terrain which gives good observation over AAs to and into the
defensive position.
"Terrain which permits the defender to cover an obstacle by fire.
A-112
“Important communication centers which affect command
communications and the use of reserves.
Key terrain also is forward of the defensive area or in adjacent
sectors. For example, a terrain feature along the FLOT or in an adjacent
sector which gives the enemy good observation over defended localities,
corrrnunication routes, or enemy AAs is key terrain when active measures are
taken to reduce the enemy advantage. The defender moves positions forward
to include the feature or take action to minimize the enemy advantage by
the use of fire, chemicals, smoke, concealment, and cover.
(5) Avenues of Approach. An AA is a route for a force of a
particular size to reach an objective or key terrain. To be considered an
AA, a route provides some ease of movement and enough width for dispersion
of a force of a sufficient size to significantly affect the outcome of the
operation. The division G2 usually considers AAs adequate for the type
brigade of the particular division. The corps and higher G2s usually
consider AAs adequate for at least a division. In determining the width
of dispersion, consideration is given to the deployment patterns, mobi I ity
means, and area required for maneuver to prevent presenting lucrative
targets for nuclear fires.
(a) Ground Avenues of Approach. A valley approach gives the
advancing force some cover from enemy direct fire and some concealment
from enemy observation. A valley approach includes the floor of the
valley, the slopes of the ridges, and the military crests. Control of the
military crests on each side of the valley is essential. In a valley
approach, the best AA is that which offers the best observation,
cross-country trafficability, road net, FofF, concealment and cover, and
dispersion, In evaluating the use of deep valley approach, the possible
intensification of nuclear effects and resulting greater casualties on the
valley floor are considered. At times, the best avenue is along the
slopes of a ridge below the military crests, rather than along the valley
floor.
The use of a ridge approach depends upon the width and shape of the
ridge, the size and deployment of the units involved, and the distance to
the elevation of adjacent ridges. A ridge approach usually has the
advantage of good observation; however, there is little protection from
enemy fire on the ridge. The best AA on a ridge is often slightly below
the topographical crest, with sufficient force on the crest to control it.
(b) Air Avenues of Approach. An AAA is a route which
provides a suitable path for a particular number of aircraft to reach a
LZ. The aviation officer or the aviation mission commander assists in
evaluating the effect of density altitude, wind, turbulence, and
visibility on selected AAAs. In selecting AAAs, the following factors are
considered:
"Sufficient air space.
"Concealment from ground observation.
A-113
° Eaaily recognized terrain features.
"Length of flight paths.
1 Sufficient air space is required for rapid movement of
the aircraft to the LZS. FS requirements involving art i llery and tactical
air support may restrict the availability of air space. Consideration is
given to gun-target lines and to restrictive fire plans that are in effect
during the air movement phase. The size of the air assault force involved
in the operation also is considered; however, no paramsters are given as
to width concerning AAA. Depending on the flight formation, a large
number of helicopters are flown over a relatively narrow AAA. Another
consideration in relation to adequate air space is the desirability of
having multiple flight routes available. Generally, in situations with
concentrated enemy forces along the LOC, multiple flight routes from the
pickup zone to the objective area and back are desirable.
2 Heavily forested and swamp areas provide good routes and
concealment from ground level because ground troops have little
opportunity to see and fire on helicopters passing overhead at tree-top
level. Low-altitude operations over heavy foliage distort the acoustic
wave from aircraft and decrease the distance at which the sound is
detected. They also hamper determination of the direction of the noise
source by ground observers. AAAs are in defi lade with respect to enemy AD
radar and weapon locations. Ridge lines are crossed as infrequently as
possible to reduce exposure time to radar detection. Steep defiles or
canyons are avoided, especially when there ie an appreciable amount of
surface wind that can cause momentary loss of aircraft control because of
downdrafts.
3 Navigation at low altitudes is extremely difficult.
The presence of easily recognized terrain features, such as rivers or
roads, significantly improves the pilot’s abil ity to navigate by reference
to ground features. Terrain corridors are usually desirable because they
afford both ease of navigation and defilade. Linear features that
parallel the direction of flight are the most valuable in assisting
navigation.
4 In the interest of minimizing the exposure of aircraft
enroute to the objective area, the shortest possible flight paths that
afford sufficient air space, concealment from ground observation, and
easily recognized terrain features are usually preferred. However, longer
flight paths are selected for purposes of deception.
(6) Combat Service Support Aspects. The analyses of the facts
and subconclusions developed in the preceding parts of the analysis are
used as a basis for further studies of the effects of CSS activities on
friendly and enemy units. This paragraph determines the effects of the
characteristics of the battlefield area on CSS that influence the
selection of a course of action by either force.
A-114
In studying the influence of the area, consideration is given to
effects cm matters such as availability of adequate routes for LOC,
facilities for maintenance and storage, construction resources, public
health situation, required shelter for administrative facilities,
availability of labor, maintenance of discipline, law and order, and
control of refugees.
4. EFFECTS OF CHARACTERISTICS OF THE AREA. This paragraph contains the
conclusions reached on the basis of the facts and subconclusions
previously developed. The effects of the characteristics of the AO on
each significant course of action which the enemy is physically oapable of
adopting and which, if adopted, could adversely affect the accomplishment
of our mission are discussed. Usually, the discussion includes effects on
the enemy’s ability to defend or attack. It also includes, a s
appropriate, the effects on the enemy’s ability to delay; to use reserves,
amphibious or airborne forces, nuclear fires, guerrilla forces, chemical
and biological agents, cover and deception, sensor devices; or to conduct
special operations and support the enemy’s forces administratively. The
discussion of the effects on our courses of action is limited to those
required for the accomplishment of the mission.
A-115
(CLASSIFICATION)
opy no 2 of copies
2d Itech Div
ELLY (8831)
2I503S July 19
SB2
ANALYSIS OF AREA OF OPERATIONS NO 6
eference: Map, series CSN 01, iestland, sheet 1 (Ebel), edition 1974, 1:50,000
. PURPOSE AND UNITING CONSIDERATIONS
a. Purpose. To analyze and evaluate the area east of Cartersberg (9297) from the general area of
verlook Ridge (9406) south to the Erie Canal euithin the division zone.
b. Mission. Division attacks 140900 July, secures high ground from Hill 322 (1394) to Hill 305 (0490)
o deny the enemy a bridgehead, and prepares to cross the Erie Canal and continue the attack to the south.
!. GENERAL DESCRIPTION OF THE AREA
a. Climate or Heather Conditions.
(1) Climate, Annex A (climatic summary).
(2) Heather, Heather forecast, 12-16 July.
(a) Precipitation. None predicted.
(b) Fog. None predicted.
(c) Temperature. Range from 70* to 86’F.
(d) Hind. Surface winds from north, 9 to 17 knots per hour.
(e) Cloudiness. None predicted.
(f) Atmospheric pressure. Average about 980 millibars.
(g) Moon. New moon, 25 July.
(h) Light data.
13 July 0232 0440 1933 2138 2024 0608
14 July 0233 0442 1932 2138 2050 0714
15 July 0234 0444 1931 2137 2114 0806
16 July 0235 0446 1930 2137 2137 0901
b. Terrain.
(1) Relief and drainage systems. Annex B (Relief Overlay), Annex C (Drainage Overlay), and Annex 0
(Slope Overlay). Area is drained by the Maine River on the west and southwest and the South River on the
northeast. The northwest to southeast ridge running from Hill 351 (9807) to Albany (3960) generally bisects
the area. The major spurs of this ridge run generally east and west. The terrain is generally rolling with
a series of sharply, rising table lands. The Maine and South Rivers and the Erie Canal are unfordable. The
Maine River south of Cartersberg averages about 30 meters in width and 2 meters in depth. The South River
averages about 15 meters in width and about 2 meters in depth. The Erie Canal has steep banks and averages
about 3 meters in depth and is about 17 to 21 meters in width at the top of the banks. All other rivers and
streams are fordable, varying in width from about 1 to 7 meters, with an average depth of 40 centimeters.
(2) Vegetation. Annex E (Vegetation Overlay) and Annex F (Vegetation Impeding Movement Overlay).
Vegetation consists of growing crops, vineyards, pasturelands, orchards, and wooded areas. Hay, wheat, and
vegetables are the main crops. Most crops are completely cut by the end of September. Hheat is grown mostly
on open-topped tablelands. Vineyards are generally terraced and on the slopes of hills. Most woods in the
(CLASSIFICATION)
Figure A-25. Example and explanation of analysis of the AO.
BMNT
BMCT
EECT
EENT
Moonrise
Moonset
0232
0440
1933
2138
2024
0608
0233
0442
1932
2138
2050
0714
0234
0444
1931
2137
2114
0806
0235
0446
1930
2137
2137
0901
A-116
CI ass if i cat ion is centered at the top and bottom of each page,
Copy number assignad by issuing headquarters. Official designation of unit. Physical
I ocat ion of command post by coordinates, state or county.
Date-time roup when the analysis is signed followed by the message reference number
(example: SB2) used when the analy sis is distributed outside the adquarters for the purpose
of acknowledgment in the clear. All appended material analysis having the suns
distribution bears the sane reference number.
The title line identifies the analyses by number (consecutive throughout the calendar year).
Reference I ist maps, charts, or other documents requ i red to understand the analy s is.
References to maps inc I ude the map series number (country or geograph ic area, ifrequired),
sheet number (and name, if required, edition and scale (if required).
Paragraph l a states the exact I imi ts of the area being studied.
Paragraph 1b states the mission and any other I imi t ing considerat ions such as t ime
limitations, the commander’s plan of action, and enemy capabilities.
Paragraph 2 is listing of pertinent facts for use as a basis for the succeeding paragraphs.
Paragraph 2a lists or.re.fers b other docunraepts .containing (for the period under study)
meteorlogical conditions to, Include precipitation, fog, croud conditions, temperature,
relative humidity, surface winds, effective winds (or winds aloft), atmospheric pressure,
I ight data to inc lude moon phases, moonrise and moonset, and other geodetic data as
appropriate. When appropriate, include magnetic phenomena.
Paragraph 2a(2) I ists data to be considered by aviation units. It is used in calculating
aircraft performance and altimeter setting. Light data are always given, as they are
necessary for the set ect ion of courses of action. The BMNT and the EENT are the be inning
and end, respectively, of enough I ight for limited visibi I ity. The BMCT and the EftCT are the
beginning and end, respectively of adequate light for large scale operat ions.
Paragraph 2b(l) describes conf igurat ion of the ground, including slopes, for personnel and
vehicles and critical relief for equipmnt dependent on configuration and conditions of
streams, including depth, slope, and condition of banks and bottom, and location of crossing
sites. Named localities are located by grid coordinates the first time they appear in the
anal ysis. Grid coordinates are repeated only if requ i red for ease of reference.
Paragraph 2b(l) also makes maximum use of special colored maps or overlays. Under each
characteristic include facts to assist in subsequent determination of the effects of the
character ist i c on the use of nuc I ear weapons, chemical agents, and important devices and
equipment used implement ing courses of action (do not include here the interpretation of
these effect on friendly or enemy possible courses of action).
Paragraph 2b(2) indicates wooded areas, including type, location, size, and shape of trees,
diameter of trunks, density, crown cover, and undergrowth include types of natural and
cultivated vegatation of norwooded areas.
A-117
(CIASS1RCAT10N)' '
area are oecicuous trees aoout 25 centimeters in diameter and approximately 10 to 12 meters apart.
Underbrush has been cleared throughout the area. Logging operations throughout the forest in vicinity of
9306 have thinned the tree stand to an average density or 90 trees per hectare. Roads and streambanks are
genera,iy borderec with trees. Small, scattered patches of trees are found in the lowland plains. Wooded
areas restrict, but do not preclude, the employment of armor..
(3) Surface materials. Annex G (Soils Overlays). 'Surface in most of the area'consists of thick
ciay-1 1 Ice soil on a hard limestone or limey shale base. .Above 200 meters elevation, with but few exceptions,
the soil is firm and capable of supporting heavy wheeled and tracked vehicles even where under cultivation.
The rains do not seriously affect trafficability at this time of year. The soil is generally wet in stream
bottoms and in thelowlands beiow 200 meters elevation. Whiie.capable of supporting light tracked or wheeled
vehicles, the soil becomes spongy and boggy where the turf has been destroyed.
(4) Artificial features. Annex H (Built-up Areas and L0C Overlay). A double-track,, railroad
crosses the area from Cartersberg to the east. A single-track railroad runs from Home {9619) to Cartersberg,
crossing the Macon saddle (9608). A double-track raitroad from the west parallels the south bank of the Erie
Canal as far as Dawson (0489). The area is covered witn an extensive network of principal and secondary
roads. Principal roafls raoiate from Cartersberg. Roads across Overlook Ridge (9406) from north to south
have been improved. National highways are at least 6 meters wide. All bridges on regularly maintained roads
are two-way class 50. Villages consist of closely grouped bui icings of brick or stone.' The enemy-has
constructeo extensive field fortifications and artificial obstacies throughout the area north of Erie Canal.
The artificial obstacles consist primarily of minefields and wire and ar,e most extensive in the South River
vat ley ana in tne general area of Athens (0194) and Auburn (049S). c
c. Other Characteristics.
(1) Sociology. The area is generally rural. The farm villages have a present population of from
50 to 100 each. Current population of Cartersberg is estimated at 50,000 and population of Harlow is
estimated at !5 r 000. The population is primarily Caucasian; farming is the principal .occupation. Principal
crops are wheat, corn,.-cotton, and grapes. . . -
(2) Economics. Little food and few-suppiies are available because the enemy has taken food and
materials to support the forces. However, some grain crops.remain fn fields and can be harvested at a later
date if protected.
(3) Government. There are civil agencies that are prepared to take over functions of civil
government as the country is recaptured. '
(4) Psychology. Thejconfiscation of food and supplies and the impressing of civilian Iabor have
made the people extremely hostile,, toward the enemy. Acts of sabotage occur frequently in'the Army’s rear
3. MILIARY ASPECTS OF THE AREA,
a. Tactical Aspects.
(1) Observation and fire. Annex I (Horizontal Visibility Overlay).
(a) Weather conditions. Annex J (Fog Overlay). Weather permits good air and ground
observation. Continued dry weather will increase dust c-louds caused.by nuclear.weapons. Observation will be
reduced for a longer period of time in nuclear, target,areas. Weather favors our, but not enemy’s,-use of
smoke. .. ' ..." [ • T.-I
(b) Relief. The high ground now he id by the enemy affords the enemy.excel lent observation
over approaches into the position. The enemy-held hills west of the Maine River dominate the western part of
the area. High ground vicinity Baida’s Peak (0004) provides the enemy with excellent observation to the
northeast, east, and south. The division objective, with the spur extending north from 1395 to 1004*
provides the enemy with exceilent, observation over ail approaches leading directly to it. FofFs within the
area for flat-trajectory weapons are generally good but short, except in valley bottoms and from the military
crests of open hilltops where they are generally excellent. FofFs on the northern slopes of Overlook Ridge
and Hill 351 are excellent and favor enemy defense. FofFs from the northern slopes of the division objective
are excellent, long-range FofFs to the south from Overlook Ridge are good and favor our attack. FofFs for
high-angle weapons are gooo tnroughout the area.
(CLASSIFICATION)
Figure A-25. Example and explanation of analysis of the AO (continued).
A-1 1 6
Paragraph 2b(3) indicates the type and distribution of soilsand subsoils in the area and
soil trafficability. Include soil content as it affects induced radiation, Use overlay if
material is extensive.
Paragraph 2b(4 ) indicates roads, railroads, bridges, tunnels, mines, towns, industial areas,
fortifications, and other features of military significance; include type of construction.
Paragraph 2c (1). (2) consider as pert inent in separate subparagraphs sociology,
pol i t ics, economics, psychology, and other character i st ics. Other character i st ics may
i nc I ude such items as sc ience, mater iel, transportat i on, manpower, hydrography, etc. Under
each of these characteristics considered, list all facts as the pertain to the area of study
and which may influence friendlyand enemy courses of action. The degree of coverage
required of these characteristics varied with the mission and other aspects of the
operat ional env iroment. These characteristics influence, to some extent, the decisions of
all commanders and become increasingly important as the area of interest of a command
increases.
Paragraph 3 anal yzea the facts in the previous paragraph to determine their influence on
factors affecting tactical and activities that are considered in the development of specific
courses of action. The axtent of the analysis depends on the mission, the means available to
accomplish the mission, and the possible means the enemy can use to prevent the
accomplishment of the mission, {n considering the factors under each aspect, include the
affects, as appropriate, of and on nuclear fires, chemical and enemy biological agents, and
important devices and equipment used in implement ing courses of action.
Paragraph 3a considers the effect that the .aerea will have on observation, fire, concealment
and obstacles; and deterimines key tarrain features and AAs.
Paragraph 3a(l) indicates graphically or describes the influence of weather, relief,
vegetation, surface materials, artificai features, and other pertinent characteristics.
Effects of and on nuclear fires, chemical agents, and so forth are included as are any marked
effects on surveillance devices equipment based on LOS and fire delivery means. Effects on
fire include effects on delivery means, FofFs and effectiveness of fires. Observation and
fire are of concern to CSS units as they influence rear area security.
A-119
■ ■ tClASSlfiCAtiOW -v *■ "
!" --J:. ■ iltvt'.-i - ■ 'i ■ : :.i. • - : :f).:
(c) Vegetation. The National Fores: from 0306 to 0597 severely'restricts observation and
FofFs in the eastern part of the area. Within ail wooded areas FofFs for flat-traiectory weapons are
restricted io forest trails and roads. Fields and tree blowdown in woods, caused by nuclear weapons. may
restrict Fofrs within woods. Wheat fields severely restrict ground level observation at this time of the
year. Forest fire smoke clouds may reduce observation throughout the area.
(d) Artificial features.- • Cnurch'steeples Iff tne numerous villages afford excellent
observation points. Villages and farm buildings wi:I limit FofFs for flat-trajectory weaoons.
(2) Concealment and cover.
la) Relief. The rolling nature of the terrain affords some degree of concealment ano cover
from ground observation. Concealment and cover are poor on the northern slopes of Overlook Ridge and HI!
351. On the southern slopes of Overlook Ridge, concealment and cover are gooc. The roiling nature of tne
terrain ano numerous .folds in the ground wi IT reduce thermal affects of- nuclear bursts 1 .
' - {$) Vegetation. Annex K (Canopy Closure Overlay). National'Forest*offers excellent conceal¬
ment and cover'for-large units.' Hoods-throughout ther area afford" excellent conceaf inenf-and-protect ion from
thermo! effects because of the thick deciduous trees befog in fu-li leaf. Wheat-f letcsfa I so' afford some ceare
of concealment. - , '<■ tv- e.
(c) 'Artrf-iciai features. Buildings i ; n the area offer cover from small arms fire and shell
fragments, but do not protect from Diast by any significant degree. > .-■ "
(3) Obstacles. Annex l (Combined Obstacles Overlay).
(a) Relief. Terrain favors enemy use of persistent chemicals in the vaOev forward of the
present position. Drainage system consists of the Maine ano South Rivers.
- " : (b) ''Vegetation. Woods', espec-ia! iy-tne National Forest, witi restrict thesross-eountry
modi I Tty ! of a: I’vehicies?- including trackiayi-ng vehicles. Tney will become severe obstacles'is the event of
biowdown by blast or it’set afire'. Cultivated areas wifi limit wheeled vehicles, terraced vineyards on the
south sidpes-of Overlook-Rfdge; Bard's Peak, and tne r plateau at 9400 northeast'of -Canter-sbecg-wi:i restrict
the movements'bf tanks and heavy vehicles to road and trails in-those areas.
!c) Surface materials. Annex M (Weather Effects on Cross Country Movement Overlay). The soi
is generally wet in areas below 299 meters elevation. This wiii magnify the cratering effects ot subsurface
nuclear bursts in these locations. While capable of suoporting iigr.t tracked or wheeled vehicles, the soil
becomes spongy and boggy where the turf has been destroyed. Soil composition coes not favor tne production
of high intensities or radio activity. .. . i- ,
id) Artificial features. Tne enemy has constructed extensive artificial obstacles consisting
of minefields and wire, particularly on the east flank ano north of Hu I 3C5 (0490. Tnis win n inoar
movements ano limit use of certain AAs in these areas. Buildings and villages do not present significant
obstacles even if destroyeo by blast, except for the suburbs of Cartersberg or the east bank of the Maine
River. " : " ' i.
(4) - ; <ey Terrain Features,
- (a) Hill 351 (9807) and Overlook Ridgewest therec*. These terra features control the AAs
in the western arc central parts of our zone. The:mission wil> oe seriously jeopardized if these areas are
not secured.
(b! Hill 359 (0004). This h<li mass dominates the central and eastern AAs. its seizure is
essential to tne integrity and security of our forces, ano will facilitate fire ano maneuver to the south.
(c) Hill 334 (9400). This plateau controls the AAs in the western part of tne division zone,
it is key terrain if cur tactica: plans call for either a main attack or a supporting attack in the area.
(d) Hill 306 (9997). This hill provides dominant observation over a wide area in this part o
the division zone, its seizure and control will greatly-'enhance the security, fire, and maneuver of any our
forces attacking in this area.
_ (CLASSIFlCATiON) _
Figure A-25. Example and explanation of analysis of the AO (continued).
A- 120
Paragraph 3a(2) on concealment and cover, indicates or describes the influence of weather,
relief, vegetation, and artifical features. Effects of and on nuclear fires, surveillance
devices, chemical and enemy biological agents, and so forth are included as appropriate. The
discussion is oriented not only on protection of own and enemy forces, but also on other
operations to include use of guerrillas, infiltration and counter infiltration, deception,
Cl, armor, and artillery. It is also oriented on site requirement for CSS and tactical
installations. Include only marked effects that help in selection of friendly and enemy
courses of action.
Paragraph 3a(3) on obstacles indicates graphically or describes all natural and artificial
obstacles and the influence of relief, weather, vegetation, surface materials, and artifical
features. Effects, as appropriate, of and on nuclear fires, chemical and enemy biological
agents, and effects on trafficabiIitv and accessibility are included. If of significant
influence, the effect of each obstacle on possible friendly and enemy courses of action is
indicated. Obstacles and trafficabiIity influence site locations for CSS units.
Paragraph 3a(4) describes key terrain features based on the analysis of observations and
tire! concealment and cover, obstacles, and mission. Any locality or area the seizure,
retention, or control of which affords a marked advantage of either force is considered. The
influence of each key terrain feature listed is discussed briefly. The discussion is
oriented toward subsequent development of friendly and enemy courses of action. Key terrain,
features selected are revised as required by the coonander's decision and current situation.
Key terrain features may be omitted when the enemy has no capability to secure or control
terrain features that will materially affect the accomplishment of the mission.
A-121
(CLASSIFICATION)
(e) Hill 326 (1199), This hill dominates favorable terrain leading directly to tha eastarn
part of the division object ive.
(f) Hi I Is 305 (0490) and 322 (1394). This terrain system constitutes the division objective,
‘he mission cannot beaccompl ishad without securing it. Control of this ridge is also necessary to
ontinuat ion of the attack to the south,
(5) Avenues of Approach. Annax N (Avenues of Approach Overlay).
(a) Avai I able to enemy into our position.
t. Axis Hill 351 (9607)-Hill 361 (9709),
2. Axis Hill 339 (9206)-Hill 356 (9310).
3. Axis Hill 230 (OOIO)-Paris (9811)-Hill 364 (9613).
(b) Available to us into the enemy's position.
1. Axis Hill 3 5 6 (9310)-Hill 339 (9206)-Hill 334 (9400)-Hill 306 (9997)-Hill 305
[0490)-r idgs east thereof (Avenue A).
2. Axis Hi 11 361 (9709)-Hi 11 351 (9607)-Hi 11 359 (0004)-Auburn (0495)-ridge Hi 11 305
10490) to Hi 11 322 (1394) (Avenue B).
3. Axis Hi 11 361 (9709)-Hill 351 (9807)-Hill 359 (0004)-Hili 271 (0702)-Hi 11 326
[1199)- Hill322 (1394)-ridge west thereof (Avenue C).
4. Axis Hill 280 (OOIO)-Hill 262 (0803)-Hill 326 (1199)-Hill 322 (1394)-ridge west
[hereof (Avenue 9).
b. Combat services Support Aspects.
(1) Personnel. Character istics of the society are such that only unskilled civil Ian labor will be
available at any time. Employment of civilian labor to meet short-term objectives must be balanced careful ly
iga inat the long-term needs of harvesting rams in ing crops.
(2) Logistics. Lack of civilian food and SUPPI ias may impose added logistic burdens on our forces.
Some pi I ferage can be axpected. Few resources beyond basic natural resources ara avai I able formi I i tary use.
(3) Civi l-military operationa. Displacement of civil ians through the impressing of civil ian labor
>y the enemy and lack of food and supplies mi 11 create problems which, if not control lad, can impact on
mi i tarwperations. The existence of civil agencies capable of assuming the functions of governmentwi 11
help al aviate the problem. Homever, these agencies will require guidance.
4. EFFECTS OF CHARACTERISTICS OF THE AREA.
a. Ef feet on Enemy Courses of Action.
(1) Effect on enemy defense.
(a) Tarrain now held by the enemy favors defense in depth from present positions to the
division objective. The anemy has excel lent observation over al I Ms, and tha enemy's f tanks ara protected
by the rivers and canal on the west and artificial obstacles on the asst. The enemy’s beet defense areas are
the enemy-occupied forward pcs i t ions.
(b) The excel lent weather cond it ions favor enemy defense and perm! t tha enemy to use
supporting firea with maximum effectiveness.
(2) Effects on enemy attack.
(a) The enemy’s beat Mis the axis Hill 260 (0100) -Paris(9811)-Hi11 364 (9613),
(b) ‘feather cond it ions are such that the enemy wi 11 not be able to maneuver toward our
poe it ions without being observed except during tha hours of darkness. Tha lack of precipitat ion favors
cross-country mobility. _ (CLASSIFICATION) _
Figure A-25. Example and explanation of analysis of the AO (continued).
A-122
Paragraph 3a(5) describes the AAs that are developed from all the previous analyses of the
tactical aspects. Such development does not consider the disposition of the enemy forces.
An AA must afford some facility of movement and room for adequate dispersion for a force
large enough to have significant effect on the outcome of the operation. When either
opposing force has available and adequate number of aircraft that can be used to deploy
troops and equipment forward to the battle area and significantly affect the accomplishment
of the mission, AAAs are listed. If terrain and weather conditions do not significantly
influence choice of flight paths, then AAAs are not listed. Enemy AAs are listed first,
followed by a list of AAs into the enemy battle area. When the opposing forces are not in
contact, or when only security forces are in contact, AAs to the battle area for both forces
are listed. Each listing of an AA is accomplished by a brief discussion to provide a basis
for subsequent development of possible courses of action by either force. For CSS units, the
discussion of AAs is based on rear area security requirements.
Paragraph 3b analyzes the facts listed in paragraph 2, and the subconclusions developed under
tactical aspects. Indicate those facts and subconclusions that significantly affect CSS
activities influencing choices of possible courses of action by either force or by requiring
special activities to ensure adequate support. Omit any activity that is not significantly
influenced.
Paragraph 3b(I) addresses personnel. Personnel management is of particular importance when
weather and~ferrain conditions are severe, when the AO has a significant population and
potential labor forces, and when political and economic conditions are unsettled.
Paragraph 3b(2) covers logistics. Logistics is of particular importance when weather and
terrain conditions are severe, when the AO imposes additional logistic requirements and has
significant resources of military value, and when political and economic conditions are
unsettled. Coverage is particularly detailed for those camnands accomplishing their mission
by logistic support of other units.
Paragraph 3b(3) discusses civil-military operations. Civil-military operations are of
particular importance in cold war, limited war, occupation operations, and when extensive
civil affairs responsibilities have been assigned to the command, it is particularly
important to tactical units when the numbers of civilians in the area present control
problems and restrict use of fire power. Coverage is detailed for those camnands with
extensive civil affairs responsibilities.
Paragraph 4 contains the conclusions developed in the previous paragraphs. The conclusions
are stated in terms of effects on the general courses of action available to both forces.
Paragraph 4a(I)(a) lists in turn, each significant possible enemy course of action, such as
attack; defense; withdrawal; use of air, armor, nuclear fires, chemical agents, guerrillas,
etc. Each listed course of action (using separate subparagraphs) is accomplished by a
discussion, to indicate the characteristics of the area favoring the courses of action. For
attack courses of action, indicate the best AA . For defense courses of action, indicate the
best defense areas and, if appropriate, the best AA leading to the defense areas.
A-123
(CLASSIFICATION)
(3) Effect on enemy air,
(a) Weather and terrain favor enemy employment of air in the division AO.
(b) Terrain favors enemy delivery of nuclear weapons by low-level air attack.
(4) Effect on enemy use of nuclear weapons. Weather cond i t ions are favorable for enemy use of
nuclear weapons. Ef feet ive winds do not favor use of fallout. Rol I ing terrain, numerous folds in the
ground, and foliage will reduce thermal effects. Obstacles will be created by forest and tree blowdown.
(5) Effect on enemy chemical operations. Weather does not favor enemy use of chemicals. Terrain
favors use of persistent chemicals in the valley forward of the enemy’s present defensive positions.
b. Effect on Own Courses of Action.
(1) The best natural AA into the enemy area is axis Hill 280 (OOIO)-Hill 232 (0803)-Hill 326
(1199)-Hill 322 (1394)-ridge west thereof (Avenue D). It is blocked by extensive minefields.
(2) The second best AA is axis Hill 361 (97091-Hill 351 (9607)-Hill 359 (0004)-Hill 271
(0702)- Hi 11 326 (1199)-Hi 11 322 (1394)-ridge west thereof (Avenue A).
(3) Weather and terrain do not favor our attack. We will not be able to maneuver toward enemy
posit i one without being observed except during the hours of darkness. The lack of precipitation will favor
cross-country mobi I ity except below 200 meters elevation. Forest f ires end tree blowdown caused by use of
nuclear weapons in Nationel Forest will restrict mobility, observation, and FofFs.
(4) Effect on nuclear weapons. Weather conditions are favorable for the employment of nuclear
weapon. The rolling nature of the terrain, numerous folds in the round, and foliage will reduce effects on
nuclear bursts. The wooded areas are dry and subject to extensive burning. Soil composition does not favor
the production of high intensities of radioactivity. Winds generally favor employment by our forces of
radiation effects of fallout from nuclear weapons.
(5) Effect of chemical agents. Weather conditions are favorable for our use of chemicals.
Acknowledge.
MANN
OFFICIAL:
Isl Foster
FOSTER
G2
Annex: A-Climatic Sumer y (omitted)
B-Relief Overlay (omitted)
C-Orainage Overlay (omitted)
0-Slope Overlay (omitted)
E-Vegetation Overlay (omitted)
F-Vegetation Impeding Movement Overlay (omitted)
G-SoiIs Overlay (omitted
H-Built-up Areas and LQC Overlay (omitted)
1-Horizontal Visibility Overlay (omitted)
J-Fog Overlay (omitted)
K-Canopy Closure Overlay (omitted)
L-Combined Obstacles Overlay (omitted)
M-feather Effects on Cross Country Movement Overlay (omitted)
N-Avenues of Approach Overlay (omitted)
Distribution: A
(CLASSIFICATION)
Figure A-25. Example and explanation of analysis of the AO (continued).
A-124
Paragraph 4b lists, in turn, broad courses of action that mill accomplish or facilitate the
accompi ismant of the mission, such as attack; defense; withdrawal; or use of air, armor,
nuclear fires, chemical agents, and guerrillas. Each listed course of action is discussed in
the same manner as enemy courses of action.
Acknowledgement instructions included if distributed outside the headquarters. Normally, the
word 'acknowledge* is sufficient.
The signature block contains the name and rank of the commander and appears on all copies of
the analysis if distributed outside the headquarters. If not distributed outside the
headquarters, it is signed by the intelligence officer.
Authentication is required only if the analysis has not been signed by the coemander and is
to be distibuted outside the headquarters.
Annexes are listed by letter and title.
Distribution may refer to a standard distribution list.
A-125
PATROL REPORT
A patrol report is a written copy of verbal information reported
following a reconnaissance or combat patrol mission. The battalion S2
generally prepares this report. Figure A-26 showa the patrol report
format,
(DESIGNATION OF PATROL)
TO: _
MAPS :_
A. Size and composition of patrol.
B. Mission.
c. Time of departure.
D. Time of return.
E. Routes out and back.
F. Terrain. (description of the terrain--dry, swampy, jungle, thickly
wooded, high brush, rocky, deepness of ravines and draws: condition of
bridges as to type, size, and strength; effect on armor and wheeled
vehicles).
G. Enemy. (strength, disposition, condition of defense, equipment,
weapons, attitude, morale, exact location, movements, and any shift in
disposition; time activity was observed, coordinates where activity
occurred) .
H. Any map corrections.
I. (Not used.)
J. Miscellaneous information (include aspects of NBC warfare).
K. Results of encounters with enemy (enemy prisoners and disposition;
identifications, enemy casualties, captured documents and equipment).
L. Condition of patrol (including disposition of any dead or wounded).
M. Conclusions and recommendations (include to what extent the task was
accomplished and recommendations as to patrol equipment and tactics).
Signature Grade or Rank Org Unit of Patrol Leader
Figure A-26. Patrol report format.
A-126
N. Additional remarks
by interrogator.
Signature
Grade or Rank
Org Unit of Patrol Leader
Time
o. Distribution.
Figure A-26. Patrol report format (continued).
FRAGMENTARY ORDER
FRAGOs are extracts from more detailed orders or are issued to change
previous orders. Like warning orders, these are usually brief oral or
written messages. Mission orders are a form of FRAGOs which provide
experienced commanders with the essentials of an order (such as a new
mission or change to a peavious mission).
FRAGOs do not have a specified format; howaver, to ansure
understanding, the OPORD format is useful. A FRAGO is issued orally or in
writing. Those elements found in a complete order are omitted when they
have not changed, are not essential, or are incomplete at the time of
issue. As a general rule, a FRAGO--
0 Is addressed to each commandar required to take action.
0 Is addressed to higher and adjacent headquarters for information.
0 Refers to a previous order. Indicates task organization changes.
0 When necessary for clarity, includes a brief outline of the
situation that generated the requirement for a FRAGO, to include a
statement of the mission, if changed.
0 Provides brief and specific instructions without loss of clarity.
0 Requests acknowledgment.
0 Contains proper classification.
With command approval, FRAGOs are prepared and issued by either
coordinating or special staff officers with command approval. Figure A-27
shows an example of a FRAGO.
A-127
(CLASS IF I CAT ION)
COPY NO OF COP I ES
5 2 d Mech Div
Xrayville (6271), Missouri
141300 5 January 1980
Frag Order YZ55
Reference. OPORD 7
Map, Series V661, Sheet 7061,
Edition 1, Scale 1:50,000
TASK ORGANIZATION. C/52 Avn OPCON 3d Bde
Eff 141400 5 Jan
1. SITUATION. Estimated enemy tank regt
delaying advance of 1st Ode
2. MISSION. No change.
3. EXECUTION:
a. Div continues attack, 3d Bde bypasses
1st Bde in north and attacks in zone to
secure division objective. tst Bde becomes
reserve, follows 3d Bale. Priority of fires
to 3d Bale.
b. 1-42 FA OS 3d Bale.
c. 1-40 FA GSR 1-42 FA.
4. SERVICE SUPPORT. No change.
5. COMMAND AND SIGNAL.
Tac CP currently at 3067.
ACKNOWLEDGE.
VON STEUBEN
MG
OFFICIAL:
YOUNG
G3
DISTRIBUTION: C
(Classification)
DC0M7308D/FEB83
Figure A-27. Example of a fragmentary order.
A-128
MISSION REPORT
The MISREP is used by all air units--strike or attack, reconnaissance
or surveillance, airlift, observation, and helicopter--to report the
results of all missions and significant sightings along the route of the
flight. The MISREP amplifies the inflight report and is normally
submitted within 30 minutes after aircraft landing to the tasking agency,
the requesting unit or agency, and to other interested organizations.
Upon completion of a tactical EW air task or mission, a debriefing is
conducted by intelligence personnel, and a MISREP is submitted.
Figure A-28 shows the MISREP format.
HEAD ING
PRECEDENCE
ORIGINATING AGENCY
ACTION ADDRESSEES
INFORMATION ADDRESSEES
SECURITY CLASSIFICATION, CODE WORD, OR NICKNAME
MISREP ( Number) DATE-TIME GROUP (GMT)-MONTH-YEAR
BODY
1. AIR TASK OR MISSION NUMBER OR NICKNAME . Reference the request number,
FRAGO number, or directive causing initiation of the mission.
2. LOCATION IDENTIFIER . Target number, line number, approved target
designator or identifier, or coordinates of the target or sighting being
reported.
3. TIME ON TARGET OR TIME OF SIGHTING . Report all times by date-time
group, using Zulu time unless otherwise directed.
4. RESULTS AND SIGHTING INFORMATION . This item should contain the pilot
or aircrew evaluation of expected results (for example, percent destroyed,
number and type destroyed, or percent of coverage) and concise narrative
information on significant sightings (for example. unusual or new enemy
equipment or concentrations of enemy forces observed to include number,
spead, and direction (if applicable)).
5. REMARKS. Includes information not specifically mentioned in above
items (for example, enemy defenses encountered, weather data, hostile MIJI
attempts, and so forth).
Figure A-28. Mission report format.
A-129
ORDER OF BATTLE ANNEX TO THE PERIODIC INTELLIGENCE REPORT
Figure A-29 showa the format for an OB annex to the PERINTREP. Omit
items not applicable and renumber the remaining paragraphs.
All remaining entries are completed, and each entry contains an
evaluation of the source and information, to include the type of source.
Figure A-30 shows a completed sample of the OB annex.
(CLASSIFICATION)
ORDER OF BATTLE
Annex _ (OB) to PERINTREP NO _ Corp s, _
1. COMPOSITION AND DISPOSITION (see appendix 1, overlay). An overlay is
usually attached to present the graphic display of enemy units. The
initial subparagraphs always contain information pertaining to
organization. Information concerning identification and disposition is
listed by mentioning the highest echelons first, followed by subordinate
units from left to right or top to bottom, as displayed on the overlay.
Related items may be combined and presented in a single entry.
2. STRENGTH. Report information pertaining to enemy personnel, weapons,
and equipment losses during the period. Replacement rates and strength
figures of individual units may be listed.
3. TACTICS. Report only new tactics and deviations from prescribed
tactical doctrine.
4. TRAINING. Report new developments and recent changes in training
programs or methods of special training undertaken by the enemy since the
initiation of hostilities.
5. LOGISTICS. Report those items which will affect current enemy
operations, such as supply status, supply systems, and locations of supply
facilities.
6. COMBAT EFFECTIVENESS. Report data on the combat effectiveness of
enemy units, either of the entire force or of a major tactical unit., List
items indicating morale, esprit, and quality of troops and commanders.
Describe the ability of the enemy unit to accomplish its expected mission.
(CLASSIFICATION)
Figure A-29. OB annex to PERINTREP format
(CLASSIFICATION)
7. MISCELLANEOUS DATA. List personalities, unit history, FPO, code
numbers and names, 06 changes, and any other item of 06 intelligence that
cannot be properly inserted in preceding paragraphs.
Acknowledge.
(SIGNATURE)
Appendixes:
Distribution:
OFFICIAL
(NAME OF G2)
Figure A-29. OB annex to PERINTREP format (continued).
A-131
Annex B (OB) to PERINTREP 29, 3 Corps, 201800 August 1985
ORDER OF BATTLE
1. COMPOSITION AND DISPOSITION (see appendix 1 overlay).
a. All EPW captured during period are from the enemy 2d Combined Arms
Army. Unit identification include--(C-l)
17 MRP _ 30 MRP _ 32 MRP _
283 MRR 141 MRR 132d Med Tk Regt
290 MRR 142 MRR
130 Tk Regt
130 Recon Bn
COMMENT. 32 MRD accepted as being organic to 2d CAA. 52 Tk Div
previously accepted, completing organization of 2d CAA.
b. Two large missile-type weapons mounted on large amphibious armored
carriers and several smaller vehicles identified in position vicinity MP
420513. (8-2) .
COMMENT. Probably elements of Free Rocket Regt, 2d CAA, previously
uniocated.
c. Captured enemy field order reveals plan to attach 40 Tk Div to 2d
CAA effective 22 Aug. (B-l).
COMMENT. EPW previously reported 40th Tk Div moving to reinforce 2d
CAA . Enemy main effort probably planned for this area.
2. STRENGTH.
Enemy losses reported during period:
EPW
KIA
ARTY ARMOR
AIR
VEH
16 MRD 37
302
2
4
1
21
30 MRD 16
52
8
1
...
16
32 MRD 8
12
—
—
—
4
Total 111 US Corps Sector 61
366
10
5
1
41
COMMENT. The marked increase in personnel losses during the period
have been sustained primarily by enemy combat patrols. Aircraft loss was
HI, observation helicopter, equipped with aeronautics radar. Overall
strength of 2d CAA is generally not affected.
(CLASSIFICATION)
Figure A-30. Sample OB annex.
A-132
(CLASSIFICATION)
3. TACTICS.
a. EPW from 16 MRD and 30 MRD state they have been instructed, in the
event their units are cut off, to continue fighting as guerilla units or
in small groups, live off the land, and destroy as much US Army property
as possible before gradually infiltrating back to friendly lines. (C-6) .
COMMENT. Intensive guerrilla activity in our rear aress can be
expected if elements of these units are cut off.
b. Enemy documents captured 07 Aug included a training pamphlet for
battalion, company, and platoon commanders, written by GD Griboyedov
entitled “Tanks Out Front,’” (appendix 3). It advocates tactics permitting
US patrols and advancing forces to pass through aggressor lines. A
coordinated tank-infantry attack is then made on open flanks and rear
elements with tanks continuing momentum of attack to destroy remaining US
forces. (B-2) .
COMMENT. Considering enemy doctrine that tanks are the decisive arm,
the above tactic is possible, particular y in review of reports of
probable employment of 40 Tk Div (para 1
4. TRAINING.
a. Reference paragraph 3b.
b. Indications of enemy concern for communications security (COMSEC)
is noted in document captured from 2d CAA dated 10 Aug, directing all
subordinate units to immediately initiate intensive training in radio
security and communications procedures. (B-2) .
COMMENT. Ml units confirm enemy lack of radio discipline and states
that security violations increase during reinforcement and relief
operations. Numerous enemy security violations have been noted since
17 Aug, further substantiating reinforcement or relief of 2d CAA units.
5. LOGISTICS.
a. EPW state enemy supply personnel have recently contacted local
merchants, farmers, and fishermen for supplies of most class I items.
(C-6) .
(CLASSIFICATION)
Figure A-30. Sample OB annex (continued).
A-133
(CLASSIFICATION)
COMMENT: Enemy either has critical shortage of class I items or has a
bottleneck in the supply system requiring local procurement of these items.
b. Air and ground reconnaissance patrols have reported enemy
stockpiling large quantities of supplies and equipment in rear areas of
frontline divisions. (B-2) .
COMMENT. Not normal supply procedures. Significance as yet
undetermined. Would indicate enemy may be planning major offensive soon.
6. COMBAT EFFECTIVENESS.
a. EPW from 16 MRD and 30 MRD state morale is high but senior officers
are disgruntled because their units always receive difficult missions while
the 32 MRD and 56 Tk Div have, until recently, been assigned lass hazardous
missions. (F-6) .
COMMENT. Analysis of unit history and recent operations of enemy 2d
CAA indicates it has usually been highly successful in combat. This, and
the fact that 2d CAA has always had fine commanders, would account for high
morale in units. This is first indication of dissatisfaction among officer
personnel. Report seems cogent, however, since 32 Mech Div has not baen
engaged in combat with US Forces in this campaign.
b. EPW reports 30 MRD to be redesignated 30 “Fusilier” Mech Div for
superior combat record. (F-6) .
COMMENT. Ill US Corps rates combat effectiveness of 30 MRD from
excellent to outstanding in comparison to other enemy divisions in same
sector. 30 MRD casualties have been comparatively small; no deserters have
been apprehended and its operations have been executed with determination.
7. MISCELLANEOUS DATA.
a. Personalities identified by EPW: (c-l).
CG, 40th Tk Div GD GRIBOYEDOV, Semyon P. (Ref 3b)
CO, 282 MRR Col CARDUCCI, Gherardo S.
CO, 283 MRR Col UNDSET, Bjornstjerna (Acting CO)
CO, 130 Med Tk Regt Col STEENWYK, Martin J.
CO, 132 Med Tk Regt Cot MATTEZ, Mario
(CLASSIFICATION)
Figure A-30. Sample OB annex (continued).
A-134
(CLASSIFICATION)
COMMENT. Confirms previously obtained information.
b. Unit history. Officer EPW stated that unit (32 MRR) trained
extensively in special tactics for assault of river lines. (F-6) .
COMMENT. Special training received by 32 MRD should increase its
overall effectiveness when employed in river-crossing operations. No
evidence of other units so trained.
c. Field post numbers: Captured document reveals enemy FPN being
used as identification symbols on documents and messages. First two and
last three digits are transposed. FPN of 46 MRD will appear as 75031
instead of 31750. (B-1) .
COMMENT. Enemy has employed this system previously as a security
measure. Expect this system of transposing digits will occur in different
patterns during future operations.
Acknowledge.
LEE
LTG
Appendixes: I—Enemy Disp Overlay
2— Enemy Army Organization Chart
3- -Enemy Training Pamphlet
Distribution: Same as PERINTREP 29
OFFICIAL
GRANT
G2
(CLASSIFICATION)
Figure A-30. Sample OB annex (continued).
A-135
STANDARD COLLECTION ASSET REQUEST FORMAT
The standard collection asset request format (SCARF) is used for
intelligence requirements tasking and for requesting information from
higher or adjacent headquarters. At corps and division, intelligence
requirements tasking is directed toward Ml commanders and commanders of
other elements of the combat force capable of collecting the information.
Intelligence requirements tasking provides the selected unit with a
specific requirement, but not with specific instructions for carrying out
the mission. The SCARF specifies--
°The information needed.
“Where to look for the movers, shooters, sitters, and emitters.
“When to look.
“When the information is needed.
“What to look with, in some cases.
Figure A-31 showa the SCARF format.
A-136
A.
B.
c.
unit)).
o.
E.
F.
H.
I .
J.
Requester number.
Originator priority.
Activity or target type (area emitter and size (point, area, or
BE number, ELINT notation or case.
Location (if known or last known).
Ouration--
"Start date-time.
"Frequency.
"Stop date-time.
"Latest acceptable date-time for information utility.
Location accuracy--
"Required.
"Acceptable.
PIR and information desired.
Justification.
Remarks (to include disciplines and collectors recommended).
Figure A-31. SCARF basic format.
A-137
AERIAL RECONNAISSANCE AND SURVEILLANCE REQUEST
The aerial R&S request is used to request a tactical air
reconnaissance or surveillance mission. The form states requirements,
identifies needs, and, occasionally, specifies the actual air asset to
perform the mission.
Any echelon initiates the request. It is used for both immediate and
preplanned mission requirements. The requester oompletes section I of the
request for each specific mission. Normally, these requests are
transmitted by electrical means. The headquarters receiving the request
adds information required to val idate or complete the request.
Figure A-32 shows the aerial R&S request form. This format is the same as
the format used for joint service operations.
A-138
[p OSSIFICATION
__ uncles
1 reE
[REQUESTOR
Iff
0408007 :
’em)
ACTION:
INFO:
IrtWMl cmtAmmh
i—r
E R0H:
IBFO:
NOT FOR TRANSMISSION
l ORIGINATOR SERIAL NO.
HOOC
L-AIR RECON REQUEST/AIR RECON TASK NO: £0 / / £2
M l TYPE OF SENSOR
M.2 TECHNIQUE
M I-Cfi^lpMOTO HlELECTROWC [T]SLAR [T]|R CD suifuiF
M-2- (Xij^Eimm rn OBLIQUE |T] PANORAMIC [T]
N MAP SERIES SHEET NO
AND EDITION NO.
«- mips Sheet R/OZ Ed 2
0.1 TARGET LOCATION
0 2 TARGET DESCRIPTION
32a AID 7H78<*(* (uTH',
01 TIARA AIRFlD
OBJECT AND
P RESULTS 0ES1RE0
(TARGET CATEGORY)
' CAT 0(0 Tiems 2,3,U f 7
Q PHOTO SCALE
0- BeSt PeSStble | | 1 BEST POSSIBLE
R NO. PRINTS, PLOTS. RPTS
« ZPrR/z Sets Prints Stereo Cover of Am fid
DELIVERY ADDRESS
S DATE TIME REO
s- TPIR to HQ. OC, DefiAtR (NFO 21
LATEST ACCEPTABLE
T DATE TIME FOR DELIVERY
1 ML.T 0108001 Jure 87> Prints (H/Zoo? June S3 l
U SPECIAL INSTRUCTIONS
U.1 TOT
U.2 PRIORITY
U.3 TARGET SECURITY CLASS
U4 REMARKS
“ TNPLT REP CATO/
U.2- | | PRI-1 | | PRI-2 | | PRI-3
U.3-
U.4-
V TASKING INSTRUCTIONS
V m SOA/j /< RHFC
COPIES TO ARMY CZ3
COMM CTR I I ATTACK I I
CURRENT OPS I I RECOR I I
IRT CZD EW I I
OTHc R
Tdtg
A
INITIALS
Figure A-32. Aerial reconnaissance and surveillance request form.
A-139
Figure A-33 shows an air reconnaissance request and task format that
is keyed to letter designators of message elements. An explanation of
each of these letter designators follows in Figure A-34.
Air Reconnaissance Task
AIR RECON TASK
(Format-not transmitted)
(Example message)
L.
Originators request and
task number.
L.
HQOC 468/82.
M.
Type of recon.
M.
PHOTOGRAPHIC, VERTICAL.
N.
Map series, sheet no and
edition.
N.
M745 SHEET 4102 EDITION 2.
o.
Location and description
of target.
o.
32U ND 747866 (UTM) TIARA
AIRFIELD
P.
Purpose of request and
reporting codes.
P.
CAT OID ITEMS 2, 3, 6, 7.
Q.
Photo scale or limits.
Q.
BEST POSSIBLE.
R.
Products required.
R.
IPIR/2SETS PRINTS PROVIDING
STEREO COVER OF TIARA
AIRFIELD.
s.
Delivery address.
s.
IPIR TO HQOC, DEFAIR INFO 27
SO PRINTS HQOC/TGTS-1,
DEFAIR/DAFIS.
T.
Date-time limitation.
T.
TOT NOT BEFORE 0706002 JUN
83 BUT NOT LATER THAN
0708002 JUN 83. PRINTS
REQUIRED NOT LATER THAN
0912002 JUN 83.
U.
Special instructions.
u.
INFLIGHTREP CAT 01 ITEMS 3,
V .
Tasking and mission data.
V .
14 SON, 1 X R4FC.
Figure A-33. Air reconnaissance request and task format.
A-140
Explanation of letter designators.
L. ORIGINATOR’S REQUEST NUMBER . The originator’s request number usually
consists of a unit identifier and a sequential numbering system. Commands
may assign blocks of numbers to subordinate units to prevent confusion.
if necessary to assist the tasking agency, commands also may establish a
system of priorities for reconnaissance tasking and promulgate priority
designators to be used in the originator’s request number.
M. TYPE OF RECONNAISSA NCE. Visual, electronic, weather, photographic,
and so forth. Additionally, if the requester requires a specific type of
sensor, system, or format to be used for some reason (such as a vertical
photograph for briefing purposes), it is specified. Such detail generally
should be omitted, however, to allow flexibility in planning and tasking.
N. MAP SERIES Z SHEET NUMBER. AND EDITION . Self-explanatory.
o. LOCATION AND DESCRIPTION OF TARGET . The target location or areas to
be searched is indicated by the appropriate coordinate reference. The
coordinate reference system used (for example, UTM grid, latitude or
longitude) is identified clearly. Predetermined search areas or LOC
segments can be nominated by relevant designators. A brief description of
the target, its name and BE number (where known) should be included.
P. PURPOSE OF REQUEST AND REPORTING CODES . It is most important that
tasking agencies and reconnaissance units understand the exact purpose of
the request. Where possible, the code statements in appropriate reference
books are used to identify the target category, reconnaissance purpose,
and items to be reported. Otherwise, a plain language statement of
purpose is provided.
Q. PHOTOGRAPHIC SCALE OR LIMITS . The photographic scale or limits should
not be specified unless there is a specific reason for doing so; for
example, survey photography or imagery is to be used for a particular task
that requires it to be at a nominated scale or physical dimension. If the
scale is nominated, care must be taken to differentiate whether the scale
appl ies to the original film or to the end product requested (item R).
R. PRODUCTS REQUIRED . Specify the reports (RECCEXREP, IPIR, and any
other end product) required. If photographs are required, specify
quantities and the size or scale desired. Photographs should be requested
only when essential and a report will not suffice. Quantities must be
kept to an absolute minimum.
s. DELIVERY ADDRESS . State clearly where the report is to be delivered.
For reports, nominate both action and information addressees.
Figure A-34. Explanation of letter designators.
A-141
T. DATE AND TIME LIMITATIONS . Specify any time constraints on the
mission and follow-up actions. In particular, specify the date and time
after which the information will no longer be of value. If the task
cannot be accomplished by this date, it will be cancel led automatically.
u. SPECIAL INSTRUCTIONS . Give instructions or information not provided
elsewhere that will aid in the planning or accomplishing of the mission.
This includes control arrangements, communications, security instructions,
details of own forces, or other pertinent entries.
v. TASKING AND MISSION DATA . This is completed by the mission tasking
agency. It generally details the unit and number and type of aircraft.
The mission number for the task is the originator's request number,
abbreviated if necessary.
Figure A-34. Explanation of letter designators (continued).
SIGNALS INTELLIGENCE TACTICAL REPORT
The purpose of the SIGINT TACREP is to transmit combat information to
fire and maneuver elements. It also is used to transmit technical data to
traffic and analysis teams or to the TCAE. It is normally sent by
electrical message or by secure FM voice radio means. it is designed to
present highly perishable information in a clear, concise, and
easy-to-read format. Distribution is made according to local guidance or
as directed by higher commands. An annotated format is available in the
classified appendix to FM 34-80.
A-142
MEACONING, INTRUSION. JAMMING. AND INTERFERENCE REPORT
The MIJI report is used to pass information from operators to their
units about actual or suspected enemy attempts to interfere with, jam, or
deceive voice, teletypewriter, or MC signals. The report is submitted by
the operator whose communications means is affected, through the net
control station (in the case of FM voice), to the unit’s C-E officer. The
C-E off icer coordinates this report with the EW officer, the intelligence
off icer and the supporting Ml unit.
MIJI reports are transmitted; however, if they are transmitted over
nonsecure equipment, reports are encrypted using the brevity list. See
FM 34-40 for additional information about MIJI reports and brevity lists.
Figure A-35 shows the MIJI report format.
LINE
1
- Type of report
LINE
2
- Affected station
LINE
3
- Station’s location or. arid coordinates
LINE
4
- Freauencv or channels affected
LINE
5
- Type of equipment affected
LINE
6
- Type emission or audio characteristics of interference _
LINE
7
- Strenath of interference
LINE
8
- Time interference started
LINE
9
- Interference effectiveness
LINE
10
- Operator’s name and rank
LINE
11
- Remarks
m
Figure A-35. Meaconlng, intrusion, jamming, and interference report.
A-143
ORAL REPORTS
Briefings are oral reports that present information to commanders,
staffs, or other designated audiences. The techniques employed are
determined by the purpose of the briefing, the desired response, and the
role of the briefer. There are four types of military briefings:
“Information briefing.
“Decision briefing .
“Staff briefing.
“Mission briefing.
The two most important briefing formats to intelligence officers and
analysts at the tactical level are the information and decision
briefings. An explanation of these two briefings follows.
INFORMATION BRIEFING
The information briefing is intended to inform and gain the listener’s
understanding. The briefing does not include conclusions or
recommendations, or require decisions. The briefing deals primarily with
facts. The briefer states that the purpose of the briefing is to provide
information and that no decision is required. The briefer provides a
short introduction to define the subject and to orient the listener and
then presents the information. Figure A-36 shows the information briefing
format.
DECISION BRIEFING
Decision briefings are intended to obtain an answer or a decision.
They are used to present a staff officer’s or intelligence analyst’s
recommended solution resulting from analysis or study of a problem or
problem araa. They vary as to formality and detail depending on the level
of command and the-decision maker’s knowledge of the problem or problem
area. In situations where the person receiving the briefing has” prior
knowledge of the problem and some information relating to it, the briefing
normally is limited to a statement of the problem, essential background
information, and a recommended solution. However, the briefer is prepared
to present the assumptions, facts, alternative solutions, or reason(s) for
choosing the recommended solution, and any coordination required. If the
person who is being briefed is unfamiliar with the problem or the facts
surrounding it, then a more detailed briefing is necessary. In this case,
the briefing includes any assumptions used in analyzing the problem, facts
bearing on the problem, discussion of the alternatives, conclusions, and
the coordination involved.
A-144
1, INTRODUCTION.
a. Greeting. Use military courtesy, address the person(s) being
briefed, and identify self.
b. Classification. Announce the classification of your briefing.
c. Purpose. Explain the purpose and scope.
d. Procedure. Explain any special procedures such as demonstrations,
displays, or tours.
2. BODY.
a. Arrange main ideas in logical sequence.
b. Use visual aids correctly.
c. Plan for effective transitions.
d. Be prepared to answer questions at any time.
3. CLOSE.
a. Ask for questions.
b. Concluding statement.
c. Announce the next briefer, if any.
Figure A-36. Information briefing format.
In the introduction, it is stated that the briefer is seeking a
decision. At the conclusion, if the briefer does not receive a decision,
the briefer asks for it. The briefer should understand the decision
thoroughly. If there is uncertainty, the briefer asks for clarification.
In this regard, a precisely worded recommendation that is used as a
decision statement, once approved by the commander, assists in eliminating
possible ambiguities. Following the briefing, if the executive officer is
not present, the briefer informs the next highest ranking officer or the
staff secretary of the decision. Figure A-37 shows the decision briefing
format.
A-145
1 .
INTRODUCTION,
a. Greeting . Use military courtesy, address persons being briefed,
and identify seif.
b. Classification . Announce the classification of the briefing,
c. Purpose . State that the purpose of the briefing is to obtain a
dec sion and announce the problem statement.
d. Procedure. Explain any special procedures to be used, such as
add itional briefers. Omit if not required.
e. Coordination . Indicate what coordination has been accomplished,
2. BODY.
a. Assumptions . Must be valid, relevant, and essential to a solution
to the problem. Omit if there are none.
b. Facts Bearing on the Problem . Must be supportable, relevant, and
necessary.
c. Discussion. Analyze courses of action. Use smooth transitions
between discussions of each course of action.
d. Conclusions . Degree of acceptance or order-of-merit for each
course of action.
e. Recommendations . State actions recommended. Must be specific,
not a solicitation of opinion.
3. CLOSE.
a. Ask for Questions .
b. Reguest a Decision .
Figure A-37. Decision briefing format.
A-146
APPENDIX B
AUTOMATION SUPPORT TO INTELL I GENCE ANALYSIS
During the past forty years, the battlefield has evolved from a
relatively simple environment to one that is increasingly sophisticated in
terms of collection systems and communications capabilities. Current
collection systems incorporate state-of-the-art components and advanced
technology. Deployed using Army-approved doctrine against known enemy
capabilities, they exhibit the ability to collect vast amounts of
information from a battlefield environment rich in enemy targets.
Parallel advances in communications capabilities complement sensor system
advances and provide the ability to transmit information faster and more
efficiently than at any other time in history.
As the information flow increases, progressively more time is needed
to identify, verify, and organize the information needed to produce
intelligence. Yet, intelligence production methods and procedures have
not kept pace with the advances made in collection systems and
communications. Information collected by technologically advanced sensor
systems and sent and received over high-speed communications equipment is
still processed individually as it is received by manually sorting,
recording, and filing it. Clearly, to produce the intelligence the
commander needs, when it’s needed, these manual processing functions must
be updated and expanded.
This appendix describes how current and emerging automated systems
support intelligence analysis. It w i 11 - -
° Describe general computer system configuration and basic tactical
military computer system capabilities and limitations.
"Discuss two current tactical semiautomated systems: MICROFIX and
Intelligence Data Processing Set.
INTELLIGENCE ANALYSIS SUPPORT
ADP systems support efficient and timely intelligence production.
This support upgrades the ability of analysts to deal with the vast
amounts of information produced during the course of a battle. These
systems are designed to supplement, not replace, existing manual analysis
support systems. They provide expanded capabilities during the storage;
access, retrieval , and manipulation; recording and record-keeping; and
dissemination portions of the intelligence production process. These
capabilities provide the analyst with substantially more time to devote to
intelligence analysis.
Using ADP systems, the analyst not only stores more information in
less space but the information is consolidated with other information and
with previously produced intelligence. With this additional storage
capacity, the analyst accesses data bases such as IPB or ground OB data
from the same system. Consolidating this data onto one system lets the
analyst quickly and easily retrieve and manipulate the data and
information needed to support the intelligence analysis process. With
more information to work from, the analyst develops a better picture of
the battlefield environment. This reduces risk and uncertainty.
ADP systems also provide the means to access this information quickly
and easily. Data is accessed in seconds, rather than minutes or hours.
By retrieving various types of information and using the computer
capabilities to arrange this information in different patterns,
information is manipulated to test previously established hypotheses or to
create a new hypotheses based upon new or emerging patterns. Through this
process of electronic comparison and contrast, the computer helps the
analyst determine unit identifications, strengths, and enemy commanders’
intent.
Computer system capabilities is used to facilitate and complement
manual methods and procedures. For example, computers are programed to
automatically record message header information into a separate file which
subsequently is printed and placed in a three-ring binder. This provides
a duplicate file that is easy to maintain and keep current and requires a
minimum of time and effort. A record of all intelligence messages and
products is printed. This establishes a record of all outgoing
intel 1 igence products and messages, including a list of all users
receiving that message or product. When manual recording is kept to a
minimum, it leaves more time for the analyst to develop intelligence.
Another example of a manual system being eased with ADP is recording
and storing preprogrammed formats. The computer assists the analyst in
preparing a variety of reports, summaries, and other intelligence
documents and message formats electronically. Once correctly formatted,
previously created lists of addresses and users are selected and
automatically printed. If electronic message sending capabilities exist,
messages are sent directly from the terminal. This capability
significantly reduces the amount of time necessary to prepare, route, and
transmit products to users, and the amount of time the intelligence
analyst spends preparing and disseminating them.
These tasks are continuous and require time and the ability to
assimilate large amounts of data quickly and accurately. The use of ADP
enhances the analyst’s abil ity to perform these tasks. It is a tool which
provides the analyst with the ability to access and use more information
and resources than manual processes provide.
COMPUTER SYSTEM CONFIGURATION
Every computer system is composed of hardware and software. Hardware
is the actual physical equipment-or components--that make up the total
ADP system. Software is a series of commands, recognized by the computer,
it tells the computer how to perform a variety of functions.
B-2
Hardware
Typical system hardware consists of a keyboard; central processing
unit; storage device (disk drive); display or monitor; and printer. These
basic hardware components access files, input new information, manipulate
data and information, and display or print data of information which the
analyst selects to perform analysis and produce intelligence. Figure B-l
shows the basic computer components.
Figure B-1 Basic computer components.
Keyboard . The keyboard serves as the primary input device to the
computer. Normally, the keyboard contains the same letters, numbers, and
punctuation keys as a standard typewriter. The computer keyboard also
contains special function keys which are used to initiate various computer
functions.
B-3
Processor . The processor is the component that executes the commands from
the programs. It controls the flow of information into, within, and out of
the computer. It also contains a limited amount of the computer’s memory.
Storage Devices . Information is stored inside the processor in special
memory locations or in a separate storage device. Examples of storege
devices are floppy or removable disks, magnetic tape, large capacity hard
cartridge or fixed disks, and cassette tapes, or cartridges. The computer
periodically reads these devices during each computing session in order to
perform programs selected by the analyst. Conversely at the end of the
computing session, data is saved to these devices if it is to be
permanently retained. Information solely left displayed on the monitor or
in the processor is lost when the system’s power is shut off.
Display, The display is a cathode ray tube (CRT) (commonly referred to as
a monitor). The monitor displays text, charts, graphs, or maps (depending
upon system configuration and capabilities). It is similar to a television
screen and is monochromatic or color.
Printer. Printers are similar to high-speed typewriters. Information from
the processor is read and the output is printed on computer paper or bond
paper. This provides the analyst with a permanent record (hard copy] of
the information.
Peripherals
Other components are integrated into the basic ADP system to provide
specialized or expanded capabilities. Whether or not components are added
to a system depends upon several factors. First, the original system is
designed so that it can be expanded. Second, expansion modules, add-on
components, or peripherals are compatible with the existing system. Third,
software limitations and design constraints are considered. Depending upon
these factors, some of the following components are integrated into a
tactical ADP system:
"Video disk players (VDPs). VDPS al low map, text, photographs, or
any information that can be stored on video disks to be displayed on
a monitor.
"Modems and communications networks. This equipment allows
information to be passed directly from one computer to another. The
modem connects directly to the telephone jack and transmits and
receives data through telephone lines. Provides interface between
data processing systems over communications lines. Paper tape
reader/punch (PTR/P) devices provide the capability to generate and
read tactical RATT messages via paper tape.
"Video cassette recorders (VCRs). Identical to VCRs used for home
entertainment, some systems have programs that al low a VCR to be
connected to the processor for use as a back-up and restore device.
B-4
Software
Software provides the instructions, tools, and basic programing
required for computer system functions. There are many types of software;
however, every system must have an operating system to be able to
function.
Operating System Software . This software enables the computer to run
applications. This operating system, which also is referred to as a
control program, is thought of as a traffic cop. It regulates all actions
within the processor and determines when any of the peripherals are
activated. Another vital function performed by the operating system is to
act as a translator between the users’ language (English, German, Spanish)
and the computer’s language (binary).
Data Base Management Systems (DBMS) Softwar e. DBMS software turns the
computer into a high-powered, automated filing cabinet. This data base
file is sorted on nearly any variable in the file’s structure. The
computer also extracts records in the file that match a very exacting
criteria, or extract just selected bits of information (fields) about all
the records in the file. This allows the analyst to manipulate data in
varying ways to get a clearer picture of the battlefield and perhaps
identify previously unrecognized patterns.
Word Processing Software . A word processing program turns the computer
into a high-powered, automated typewriter. This software gives the
analyst the ability to compose briefings, reports, and messages, and to
perform editing functions for storage, printing, and display.
Applications Programs . These programs are the actual commands that
perform the automated operations the analyst requires. These are written
in a DBMS or computer language. Some common languages are BASIC, PASCAL,
and FORTRAN.
ADVANTAGES AND DISADVANTAGES
Advantages and disadvantages depend on the system, software, and
training. The analyst uses the ADP system to store and manipulate facts
or data that, when analyzed, produce intel I igence.
Advantages
In general, for any system, the advantages of automated support to
intelligence analysis lie primarily in the areas of information management
and dissemination. ADP systems help the analyst disseminate information
with speed and increased accuracy.
Speed. ADP support is particularly useful to the analyst because of the
speed at which computers can perform calculations and assemble specific
data from a large body of information. Given accurate data input, the
computer produces a faster, more accurate output than is obtained through
human calculation. Stress or pressure do not degrade ADP operations.
They carry out prespecified tasks almost indefinitely. A caution about
B-5
computers being more accurate than humans working in a purely manual
mode. Humans respond almost instantly to questions requiring a
judgmental response: “’What are the 10 most significant actions in the
last 12 hours?’” The computer cannot make such a response. To a computer,
a report about the movement of the independent tank battalion carries the
same weight as a report about three wheeled vehicles moving along an
unidentified road.
Report Generation . When ADP systems are equipped with word processing
capability, the analyst creates reports, messages, summaries, or other
intelligence-related documents quickly and easily.
Electronic Communication . If ADP systems are netted, that is, linked
together, data is transmitted directly from terminal to terminal. If they
are not netted, a messenger sends correctly formatted diskettes, as well
as hard copy reports. However, diskettes offer the advantage of being
able to be loaded into the receiving person’s computer. In any case,
copies of the message are produced and then transmitted over established
tactical communications channels. In either event, the ability to
disseminate intelligence products is substantially improved over more
traditional methods of dissemination.
Disadvantages
Understanding the System . Most of the disadvantages of ADP support to
intelligence analysis result from a lack of computer literacy or an
understanding of specific ADP system limitations and capabilities.
Analysts and commanders tend to assign capabilities to the system that it
does not possess. This results in an unrealistic view of the support ADP
provides to the commander and creates a false reliance on the computer
system by the analyst.
Computers perform only those functions they are explicitly told to do.
They do not learn from mistakes, nor will they correct improper input.
Therefore, the data stored in the computer is only as accurate as the data
that is entered. Computers also have a finite capacity to store data.
Design parameters establish this capacity. While additional storage
capacity is provided by add-on component storage equipment, when maximum
storage limits are reached, old data is deleted to make room for new
input. Dual record-keeping procedures, both manual and automated, are
established and kept in an updated status. If ADP capabilities are
interrupted or lost, this ensures that intelligence production continues.
Multi-Processing. Another disadvantage is that some tactical systems
cannot input, process, and output data simultaneously. Others only al lOw
access to a shared data base on a one-by-one basis. Therefore, the
analyst determines which data is most important and balances input,
output, or access functions to best support the mission. This is critical
to appropriate and maximum use of the ADP system.
Environment . Computers also are vulnerable to environmental conditions
and influences like temperature extremes, weather conditions, power
fluctuations, and power outages. Terrain constraints also may affect ADP
access, system mobility, or system capabilities.
B-6
Temperature extremes, like alternating very hot and very cold weather
cause condensation. Condensation inhibits the read and write ability of
the system. Extreme temperatures also result in partial or complete loss
of previously input data. For example, rain, fog, and high or low
humidity cause partial or even complete system failure.
Static electricity also results in partial or complete loss of data.
Planned power outages require shutdown of all computer functions
immediately before and during the length of the outage. Unplanned power
outages or power surges not only shut down computer functions, but also
result in varying degrees of hardware or software damage or data loss.
Severe weather conditions, like lightning or dust storms, produce the
same effects as unplanned power outages or power surges. Dust in the read
and write heads of hard and floppy disk dr ives result in inaccurate input,
output, data loss, or total destruction of disk capability.
Terrain also is a factor in ADP systerm survivabi I ity and use. Each
time the system is moved, leveling is required before the system is
operational . Crossing rough terrain under highly mobile conditions
partially damages or completely destroys the ADP system. Also, while
mobile, current systems are inoperative. Data accumulated while the
computer system is down or inoperative must be saved and input when
circumstances permit. This means that when the system initially returns
to an operational status, it does not provide data for irrrnediate analysis
until the data base has been updated. If the accumulation of data is such
that input requires a substantial amount of time, the analyst finds that
manual systems and data bases support the commander’s intelligence needs
more efficiently.
Many of these disadvantages apply, in whole or in part, to all
tactical battlefield electronic and automated systems. When the
capabilities and limitations of ADP systems are thoroughly understood,
measures are taken to protect the system while making maximum use of ADP
support to intelligence analysis. By taking these factors into account,
ADP support to intelligence analysis is a viable tool which the analyst
uses to give the commander a more complete, accurate, and timely picture
of the battlefield.
CURRENT AUTOMATED SUPPORT SYSTEMS
The US Army currently has two systems deployed specifically to support
tactical SIGINT and all-source intelligence analysis functions: the
MICROFIX and the TCAC. The MICROFIX assists the analyst in fulfilling the
commander’s need for information and intelligence on the AirLand
Battlefield. The TCAC provides a variety of SIGINT and EW asset mission
management functions, as well as to assist the analyst. Both of these
systems are designed to enhance the analyst’s ability to manipulate large
quantities of unprocessed or partially processed data. Information is
quickly and easily added, deleted, or moved. Historical enemy locations,
enemy strengths, equipment, and unit designations, and specific enemy
equipment capabilities and limitations are accessed from previously stored
data base information. In fact, the analyst accesses data that is limited
B-7
only by storage capability, the data bases available for review, and the
information or data the analyst elects to input into the system during the
course of the battle.
Since the TCAC system is found only in USAREUR and XVIII Airborne
Corps, (and is a non-TOE--table of organization and equipment--item) this
manual does not address it in detail.
MICROFIX
MICROFIX was introduced into the Army as a training device. The
system exists to provide Ml soldiers an opportunity to become familiar
with computers before future automated systems, such as the al l-source
analysis system (ASAS), are introduced. The purpose of MICROFIX also is
to support the tactical analyst, as OB analyst (96B), SIGINT analyst
(98C), counter-SIGINT analyst (97G), Cl agent (97B), or a terrain analyst
(12 CMF). The MICROFIX gives the analyst the capability to input data
into complex data bases. The analyst manipulates this data to provide a
source of accurate and frequently updated knowledge about past and present
enemy activities. This information assists the analyst in determining
enemy courses of action and developing counter-strategy. The MICROFIX
system also produces various reports and data files which are generated by
the analyst. The system is menu-driven (all the user’s options are on the
screen at all times) and quite easy to use. Figure B-2 shows the MICROFIX
system.
The system is based on the Apple II Pulse Microcomputer and
incorporates other off-the-shelf components. TEMPEST engineering provides
emission security between components of the system. Expansion cards
provide the capability to control a large amount of peripheral equipment
in the field environment. Figure B-3 outlines the hardware components of
the MICROFIX system.
Figure B-4 shows further details regarding the eight basic components
of the MICROFIX system. The MICROFIX is mounted in an AN/TYQ-5 data
analysis center or in any shelter, tent, or building the G2 considers
appropriate. Since both power boxes, the power conditioner, and the
standby power supply, have surge protectors, the system is powered by
either commercial power or a filed generator. Both styles of VDP and
power box are shown, but only one VDP and one power box comes with each
system.
In addition to the eight basic components shown in Figure B-4, two
special components are available. The VCR and PTR/P are issued on a 1:3
to 1:4 ratio; one component for every three or four MICROFIX systems. The
VCR is used to backup and restore the entire 20 megabyte memory of the
hard disk. The PTR/P is used to cut a five or seven band of paper tape.
The message is generated in the system’s word processor (Wordstar) and,
once properly edited, the MICROFIX system cuts the tape. Figure B-5
provides details on these two components.
B-8
S—1
r!
- M -
B
to*
1
L
tee at
31
Monochrome
Monitor
Color Monitor
CPU
Hard Disk
Keyboard
Standby Power
Supply
■ Printer
Front-Loading
■ Video Disk
Player
View with Front-Loading Video Disk Player
and Standby Power Supply
Monochrome
Monitor
Color Monitor
CPU
Hard Disk
Keyboard
Power
Conditioner
Printer
Top-Loading
Video Disk
Player
View with Top-Loading Video Disk Player
and Power Conditioner
Figure B-2. MICROFIX system.
B-9
HARD DISK SYSTEM. The Corvus 20 megabyte hard disk drive assembly stores and
mantains system software and the master data base.
2. MONOCHROME MONITOR. The monochrome monitor displays MICROFIX TEXT on a
screen in green or black.
3. COLOR MONITOR. The amdck color monitor displays color graphic data. This includes
video disk maps and military symbology.
4. PRINTING. The Apple Dot Matrix Printer operates at 120 characters per second (CPS) and has
graphics capability.
5. VIDEO DISK PLAYER. The VDP reads photos or map sheets from a laser disk, using the same
technology as used on a compact disk player. The photos of the map sheets are displayed on
the color monitor.
6. APPLE II PLUS MICROCOMPUTER. The microcomputer is capable of controlling a large
complement of peripheral equipment while operating in a field environment.
7. KEYBOARD. The keyboard assembly uses a full 128 ASCI character set, joystick and
enhancer board. This equipment provides upper and lower case letter and number capability, in
addition to auto-repeat keying.
8. POWER BOX. The older grey power conditioner has eight outlets on its top, assure protector
and the capability to work with 110 or 220 volts. The newer green standby power supply has six
outlets in the rear panel, a surge protector, a built-in battery pack capable of providing 20-25
minutes of uninterrupted power but works only with 110 volts.
9. VIDEO CASSETTE RECORDER. (Not shown in Figure B-2.) The VCR is used to initialize
the system (hard disk) and acts as a backup or restore device for the hard disk drive assembly.
This expands the potential data base capability of MICRO FIX. The VCR initiatea hard disks and
backups which are quicker and easier to use than floppy disks. VCRs are issued with every three
to four systems, or one per installation.
10. PAPER TAPE READER/PUNCH. (Not shown in Figure B-2.) The paper tape reader/punch
(PTR/P) punches a paper tape coPy of messages prepared on the MICROFIX for transmission
over tactical RATT systems. It also reads paper tape. PTR/P equipment is issued with every
three to four systems, or one per installation.
Figure B-3. MICROFIX hardware components.
8-10
EQUIPMENT SIZES AND WEIGHTS
TM, P. 1-2 thru 1-23 (Equipment Data)
CENTRAL PROCESSING UNIT CPU
HEIGHT 9.00 in. (22.86 cm)
WIDTH 16.62 in. (42^1 cm)
DEPTH 23.50 in. (59.69 cm)
WEIGHT 41 lbs. (18.6 kg)
RECORDER REPRODUCER DIGITAL
HEIGHT 5.50 in. (13.97 cm)
WIDTH 16.62 in. (42.21 cm)
DEPTH 23.30 in. (59.69 cm)
WEIGHT 42 lbs. (19.1 kg)
KEYBOARD DATA ENTRY
HEIGHT 1.75 in. (FRONT) (4.44 cm)
3.12 in. (BACK) (7.92 cm)
WIDTH 19.25 in. (48.90 cm)
DEPTH 7.25 in. (18.42 cm)
WEIGHT 6 lbs. (2.7 kg)
HEIGHT 7.50 in. (19.05 cm) PRINTER
WIDTH 17.00 in. (43.18 cm)
DEPTH 16.00 in. (40.64 cm)
WEIGHT 39 lbs. (17.7 kg)
INDICATOR, DIGITAL DISPLAY COLOR
HEIGHT 14.12 in. (FRONT) (35.86 cm)
11.25 in. (BACK) (28.58cm)
WIDTH 16.62 in. (42.21 cm)
DEPTH 18.00 in. (45.72 cm)
WEIGHT 53 lbs. (24.0 kg)
INDICATOR, DIGITAL DISPLAY
COLOR
MONITOR
KEYBOARD
MONOCHROME
HEIGHT 14.12 in. (FRONT) (35.86 cm) MONITOR
11.25 In. (BACK) (28.58 cm)
WIDTH 16.62 in. (42.21 cm)
DEPTH 18.00 in. (45.72 cm)
WEIGHT 36 lbs. (16.3 kg)
REPRODUCER, VIDEO DISK
HEIGHT 730 in. (19.05 cm)
WIDTH 19.87 in. (50.47 cm)
DEPTH 29.81 in. (75.72 cm)
WEIGHT 105 lbs. (47.6 kg)
FRONT-LOADING OR
VIDEO DISK
PLAYER
TOP-LOADING
VIDEO DISK PLAYER
POWER SUPPLY CONDITIONER
HEIGHT 8.00 in. (20.32 cm)
WIDTH 13.00 in. (33.02 cm)
DEPTH 15.00 in. (38.10 cm)
WEIGHT 30 lbs. (13.6 kg)
POWER PACK
STANDBY
POWER
SUPPLY
(SPS)
REPRODUCER, VIDEO DISK
HEIGHT 11.00 in. (27.94 cm)
WIDTH 18.00 in. (45.72 cm)
DEPTH 25.50 in. (64.77 cm)
WEIGHT 67 lbs. (30.4 kg)
POWER SUPPLY, STANDBY
HEIGHT 13.0 in. (33.02 cm)
WIDTH 8.5 in. (21.59 cm)
DEPTH 23.0 in. (58.42 cm)
WEIGHT 75 lbs. (34.0 kg)
FigureB-4. Eight components ofTS/flCROFlX.
RECORDER-REPRODUCER
VIDEO
HEIGHT 4.50in. (11.43 cm)
WIDTH 17.00 in. (43.18 cm)
DEPTH 16.93 in. (43.00 cm)
WEIGHT 22 lbs. (10.0 kg)
VIDEO CASSETTE
RECORDER (VCR)
RECORDER-REPRODUCER
PAPER TAPE
HEIGHT 11.25 in. (28.58 cm)
WIDTH 15.31 in. (38.89 cm)
DEPTH 19.37 in. (49.20 cm)
WEIGHT 50 lbs. (22.7 kg)
Figure B-5. Additional MICRO FIX components.
PAPER TAPE
READER/PUNCH
(PTR/P)
B -11
MICROFIX SOFTWARE
MICROFIX software provides analysts with the ability to collect,
consolidate, and retrieve information in the area of all-source
production, SIGINT, counter-SIGINT, OPSEC, and topographic analysis.
The analyst uses MICROFIX software to organize information into
categories which facilitate rapid and meaningful analysis. The MICROFIX
software provides the ability to manipulate records in various data
bases, display tactical overlays on the color monitor, cross-correlate
data from different data bases, and print reports. Figure B-6 shows the
baseline software (those files which are found on all MICROFIX systems).
DATABASE APPLICATIONS
Airfields
River Crossings
Attrition
Salute Spot Report
Bridges
TO&E
Location History
Tunnels
Obstacles
Unit Hierarchy
Order of Battle
Water Supplies
I SINGLE FUNCTION APPLICATIONS
Collection Planning Aid
Help
Coordinate Conversion
New Map
CP/M
Paper Tape Interface
Format
Print Graphic Screen
Flex
DEVELOP A NEW APPLICATION
Define
Shape
New Symbol
Symbol Definition
Overlay Definition
JOYSTICK CONTROL
SITMAP
COMMERCIAL SOFTWARE
WordStar
PASCAL
Multiplan
BASIC
dBase II
Figure B-6. Baseline software features.
B-12
The primary advantage of the MICROFIX system is that it provides the
tools to manipulate and retrieve data quickly and accurately. It gives
the analyst the ability to access a much larger collection of data with
more speed than manual systems provide. New information is added to
existing data bases, new data bases are created, and old or inaccurate
data are deleted. Graphic overlays allow the analyst to visually test
theories and develop or discard hypotheses. Hard-copy printouts of text
information, produced at each developmental stage of the analysis process,
provide verification of the logic used to develop the final intelligence
products and also serve as source documents for historical record-keeping
purposes.
Figure B-6 shows all the applications that constitute the software
package known as the all-source production system (ASPS). The baseline
software package forms the foundation for all the other configurations.
The additional software packages are explained in the order in which they
were released.
Topographic Workstation
Members of the terrain analysis team use the topographic workstation.
The topographic software has all the applications of the baseline plus two
topographic-specific applications: Topo and Topows. These applications
al low the user to use digital terrain mapping features (tinted elevation,
slope, or speed overlays; LOS profile; oblique view; perspective view and
visible area plot); weather and environment features (sun rise and set,
phases of the moon; NBC and smoke calculations; affect of weather on night
vision devices, electro-optic sensors, and density altitude calculations);
and a mobility calculator for friendly and enemy wheeled and tracked
vehicles.
Technical Control and Analysis Element Workstation
SIGINT analysts use the TCAE workstation. TCAE software has all the
applications of baseline software pius five SIGINT-specific applications:
“Fix. Allows the user to input and plot lines of bear ng and sjte
locations. The program will calculate and plot the e| lipse of the
intercepts.
"Place. The automated gazetteer.
"COMINT working aid. A collection of four data bases (frequency,
call sign, code word, and case notation) that al lows correlation
across each other.
"ELINT working aid. An automated ELINT parameters list (EPL).
"DATEXT. The data extract (DATEXT) program allows the user to
create a subset from a file of messages. DATEXT allows the user to
identify several key words, phrases, and numbers to cull the entire
file down to a subset of messages which deal with the topic of
interest.
B-13
Counterintelligence Workstation
The counter-SIGINT analyst uses the Cl workstation. The name of the
workstation is a misnomer as the Cl workstation is appropriate only for
the 97G. Cl workstation software has all the applications of the baseline
software plus 11 counter-SIGINT-specific applications:
“Friend y and enemy antenna systems.
“Friend y and enemy SIGINT and REC unit OB.
“Friend y and enemy SIGINT and REC unit location.
“Friendly and enemy SIGINT and REC organization by doctrine.
“Friendly and enemy emitter and collector’s characteristics.
“Enemy fixed station location.
OPSEC Workstation
The OPSEC workstation is designed for use by the intelligence analyst
and supporting the OPSEC staff element. Specific characteristics of the
OPSEC workstation are uncertain.
DISTRIBUTION OF MICROFIX CONFIGURATIONS
Tables B-1 and B-2 depict the number of systems at each echelon. Also
shown is a recommended distribution of the various workstation
configurations.
Table B-1. Workstation distribution (mid- to high-intensity conflict).
TOTAL
ASPS
TCAE
Cl
OPSEC
TOPO
Theater
1
1
Corps
13
6
4
1
1
1
Division
7
2
2
1
1
1
SEPBDEorACR
2
1
1
B-14
Table B-2. Workstation distribution (low- to mid-intensity conflict).
TOTAL
ASPS
TCAE
cl
OPSEC
TOPO
Theater
Corps
Division
SEP BDEor ACR
7
2
2
1
Oo rl
1 o r 2
0 o r 1
2 o r 3
1
1
The G2 determines specifi c al location of workstations for a given
exercise or requirement.
UT ILIZATION OF MICROFIX
Methods of using the MICROFIX system are limited only by the user’s
imagination. Several units are innovators in their use of the system.
Some examples are—
0 Printing the entire OB file (or selected enemy units) for use as
an OB book. Updating the OB book is easier by doing the additions,
deletions, or changes on the computer and then printing the updated
or added records.
0 Printing the unit hierarchy report for the enemy units your unit
is facing. This report includes unit name, parent unit name,
location, and DTG of last ’siting. Gaps in your intelligence
holdings become very evident since the computer prints a blank space
for missing data. This report provides guidance to CM&D, provides a
quick reference for Rlls from adjacent and higher units and, by
posting a copy beside the SITMAP, acts as a quick reference guide
for locating enemy units.
0 Using the location history function to plot the location histories
of key enemy units (that is, independent tank battal ions, RAGs,
DAGs, BMP-equipped MRRs) on the color map screen. Plotting the
movement history of these units provides an indication or
confirmation of enemy commander’s intent. Location history also
indicates variances to doctrinal rates of march. This alone
provides key indications to the enemy commander’s intent or the
terrain and weather influenced limitations not previously identified
in the IPB.
0 After doing your IPB in garrison, various options of enemy attack
are conjectured. These various options are then templated over the
terrain. Each option then is drawn on the color map using the
sketch function and saved for immediate recall . When the exercise
scenario ^real combat) confirms one of your templated options,
considerable time is saved in analyzing the AAs.
B-15
APPENDIX C
INDICATORS OF ENEMY COURSES OF ACTION
Indicators are any positive or negative evidence of enemy activity or
any characteristic of the AO that points toward enemy capabilities,
vulnerabil ities, or intentions. Individual indicators cannot stand
alone. Each indicator is integrated with other factors and indicators
before patterns are detected and enemy intentions established. Indicators
are developed by the ASPS analysts who are assisted by other TOC elements
in the G2 or S2 section. All indicators are developed to answer the
commander’s PIR and IR. The analyst uses indicators to correlate
particular events or activities with probable enemy courses of action.
Indicators are also used to determine what events or activities occur
for an enemy to follow a particular course of action. The ability to read
indicators (including recognition of enemy deception indicators)
contributes to the success of friendly operations.
Enemy deception operations provide indicators in an attempt to create
false or misleading patterns of enemy intentions. Analysts detect these
false indicators and then determine what actual courses of action the
enemy is attempting to initiate. Enemy attempts at deception are
discovered by comparing indicators, intelligence, and combat information
from all sources to arrive at an accurate picture of the battlefield.
INTELLIGENCE INDICATORS
Tables C-1 through C-7 show different types of intelligence
indicators. These lists of indicators are by no means complete, nor are
they intended to apply to all situations or all types of enemy forces.
They give some types of indicators which when incorporated with other
indicators, creates patterns or suggests a series of activities which
point to typical enemy activities or cour ses of action. Analysts are
prepared to develop their own indicator ists for the specific situations
which confront them.
TableC-l. Enemy offensive indicators.
ACTIVITY
EXPLANATION
Massing of motorized elements,
tanks, artillery, and logistical
support.
Areas of secondary importance are
denuded to mass maximum strength
main effort.
often
for the
Deployment of combat element
(motorized rifle, armor,
antitank (AT)) echelons on a
relatively narrow frontage.
Normal attack formation provides for
the second echelon of the regiment to
be located 5-15 km in the rear of the
first echelon, on-line; and the
division second echelon 15-30 km in the
rear of the first echelon.
c-1
Table C-1. Enemy offensive Indicators (continued).
ACTIVITY
EXPLANATION
Forward units disposed on
relatively narrow fronts and
depths.
Concentration of mass toward
e ther or both flanks within
f rst echelon defensive area.
Demonstrations and feints.
Establishment and strengthening
counterreconna issance screen.
Forward movement of hostile
units.
Increased patrolling (ground
reconnaissance) .
Forward CPS located
close to the FLOT. Other
CPS move forward.
Locating a division-sized
operation maneuver group
(OMG) at Army; Army-sized OMG
at front.
A MRR breakthrough zone is from 2-4 km
within an assigned attack frontage,
which varies from 3-8 km. MRR
headquarters located approximately 4 km
from the FLOT during normal attack
posture.
Single or double envelopment normally
is attempted in the offense. Tanks and
motorized units on either or both f anks
may indicate single or double
envelopment.
Local, small-scale attacks or
demonstrations involving motorized rifle
units, tanks, and artillery frequently
precede a general attack.
Counterreconnaissance screens are
used to cover possible assembly areas,
routes of troop movement, or regrouping
of forces to be used in the attack.
Before launching an attack, troops
may be moved to assembly areas from
which they can deploy.
Patrolling by motorized rifle units
usually is more active before an attack.
Preceding an attack, an auxiliary CP
is establ ished, if needed, by Army or
front. The division main CP is located
5-15 km from the FLOT; the division
forward CP is located 5 km from the
FLOT; the regiment main CP is located
2-3 km from the FLOT; and the battalion
CP or OP is located 500-1,000 m from the
FLOT.
OMGS are formed preceding an offensive
operation. They are generally committed
before the conclusion of the first
echelon battle and operate independently
of the main forces. OMGS use a separate
axis of advance from the main body.
c-2
Table C-1. Enemy offensive Indicators (continued).
ACTIVITY
EXPLANAT ION
Massing of artillery units. Large RAGs, DAGs, and Army artillery
groups (AAGs) indicate initiation of
main attack. Enemy norms are 60-100
tubes per kilometer of frontage against
wel l-prepared defenses for main attack;
60-80 tubes per kilometer of frontage
against hasty defenses for main attack;
and 40 tubes per kilometer frontage for
secondary attack. The RAG is usually
located 1-4 km from the FLOT; the DAG
usually 3-6 km from the FLOT; and the
AAG is usually more than 6 km from the
FLOT. AAGs are formed only in the
offense and only to support the main
attack. TMS-65 are within 4 km of the
FLOT for smoke operations.
Extensive artillery preparation The offense is built around the
of up to 50 minutes in duration, striking power and shock of massed
artillery. Preparations of 1/2 to 1
hour normally precede an offensive.
Dispersal of tanks and self-
propelled howitzers to units.
Movement of fire and missile
forward.
Tanks accompanying leading waves of
assault motorized units--with motorized
self-propelled howitzers following the
tanks closely, by bounds.
Enemy SAM control radars
require time to be set up and oriented.
The enemy prefers to establish SAM
capability before moving other forces
forward. In the event of the arrival of
the second echelon, control radars are
establ ished to allow for an overlap of
coverage as the first echelon moves
their SAM radars forward in the offense.
FROG, SS-21, SS-23, and SCUD
units located forward.
2 to 4 ZSU-23-4S located in
forward areas.
Enemy offensive operations also occur
in-depth. Forward movement of SSMS puts
friendly airfields and depots in
jeopardy.
Medium AD guns are displaced before
attack to protect assault forces and to
facilitate forward displacement during
the attack. ZSU 23-4s protecting the
leading battalions are approximately
1.25 km to the rear of the FLOT.
c-3
Table C-1. Enemy offensive indicators (continued).
ACTIVITY
EXPLANAT ION
Increased air reconnaissance,
Air reconnaissance usually is more active
before an attack.
Systematic air bombardment.
Before the attack, the enemy may engage
in the systematic “softening up” of key
positions by bombardment,
Establishment of auxiliary
airfields or activation of
inactive air fields.
Buildup of logistics and maintenance
capability indicates increased
capability to support offense.
Clearing lanes through
obstacles within own position.
Lanes are cleared and marked through
mined areas, and ramps and bridges
prepared over ditches and trenches within
enemy’s own position. This is done
before attack to facilitate forward
movement and grouping, particularly at
night.
Reconnaissance and destruction
of obstacles that are part of
our defenses.
Usually on the night preceding an attack,
enemy patrols reconnoiter friendly
obstacles to determine a plan for
clearing lanes. The patrol destroys only
such obstacles that will not disclose the
direction of the main attack.
River assault crossing units
located forward (providing there
is a water obstacle) .
Amphibious, bridge, and other engineer
units with water-crossing capabilities
are located near the FLOT and also
echeloned to the rear. They are also
collocated with other tactical units of
the attacking force.
Airborne, airmobile, and air
assault attacks on our rear area.
The enemy conducts offensive operations
throughout the depth of the defense.
Heliborne attacks are also made to
facilitate difficult operations, like
river crossings.
Increased enemy agent activity
in rear area.
The enemy attempts to prevent or disrupt
the forward movement of friendly
supplies, equipment, maintenance, and
reinforcements.
Extensive efforts to destroy
nuclear storage areas and
delivery systems by air,
artillery, and sabotage.
Enemy doctrine calls for the
elimination of friendly nuclear weapons
by any means. The enemy considers that
we are more likely to use nuclear weapons
when we are in the defense.
c-4
Table C-1. Enemy
_ ACTIVITY _
Movement of noncombatants out
of the combat zone.
Conducting drills and rehearsals
in rear areas.
Increased activity in rear
areas.
Traffic control units marking
routes to the FLOT.
Forward placement of supply
and evacuation installations.
indicators (continua).
_ EXPLAN AT ION _
Noncombatants hinder rapid forward
movement of follow-on forces.
Major attacks may be preceded by drills
or rehearsals. This is particularly
true of attacks against fortified
positions or strongly defended river
lines.
Before an attack, supply and
administrative activities increase in
the rear areas.
Traffic control points are employed
throughout the march routes to
facilitate march formations. Allied
border guards assist by controlling
traffic through the barrier areas of the
borders.
Supply and evacuation installations
usually are located well forward for an
attack, Technical observation points
are established close to the FLOT.
Repair and evacuation groups are located
at assembly points close to the FLOT to
repair or evacuate damaged vehicles.
The division supply point (ammunition,
petroleum, oil, and lubricants (POL),
rations) is located 25-30 km from FLOT.
The regimental ammunition supply point
is located 10-15 km from the FLOT; the
regimental repair point is located
10-15 km from the FLOT; the regimental
POL point is located 10-15 km from the
FLOT, and the regimental rations point
is located 10-15 km from the FLOT.
Battalion ammunition and rations supply
points are located 5 km from the FLOT.
The division repair point for tanks and
weapons is located 2-4 km from the
FLOT. The division repair point for
wheeled vehicles is located 10-14 km
from the FLOT. Rear control points for
the front are located 150-200 km from
the FLOT; for the Army are 25-40 km from
the FLOT; for the division is 20 km from
the FLOT; and for the regiment are 20 km
from the FLOT.
c-5
Table C-1. Enemy offensive indicators (continued).
ACTIVITY
EXPLAN AT ION
Location of maintenance parties
on lateral routes.
When the enemy conducts a march, the
enemy establishes several maintenance
parties on lateral routes to facilitate
march operations.
Medical points and stations
move forward.
Medical units move forward before an
offensive operation to support
anticipated medical and evacuation
requirements. Division medical points
and stations are located 10-14 km from
the FLOT; the regimental medical points
and station at 10-14 km from the FLOT;
and the battalion medical points and
station at 1.5-3 km from the FLOT.
Radio sil ence on nets organ c
to the d vision.
The enemy attempts to deny us
information which can be developed from
intercepting radio traffic.
Abnormal logistics traffic on
command nets.
To expedite supplies to units about to
conduct a main attack, commanders may
get personally involved.
Dummy traffic in radio nets to
cover unit moves.
The enemy will attempt to deceive us
about the location of enemy forces.
Deception operations to cover
unit movement.
Same as above.
Extensive smoke operations.
Smoke operations mask the movement of
units during the period immediately
preceding an attack.
SIGINT and jamming assets
located forward.
SIGINT and jamming assets will move well
forward to within 2-4 km of the FEBA
before attack.
Extensive spot and barrage
jamming of our front line units’
communications nets, as well as
communications systems
associated with tactical air
control systems.
Extensive jamming will precede an
offense to cause the maximum disruption
of our C 2 communications. However,
jamming will cease when enemy forces
reach our main defense area to prevent
interference with their own
communications systems.
C-6
Table C-2. Enemy defensive indicators.
ACTIVITY
EXPLANAT ION
Preparation of battalion and
company defense areas consisting of
company and platoon strong points.
Defense is based on holding prepared
defensive areas and counterattacks by
tank-heavy forces.
Extensive preparation of field
fortifications.
The enemy makes extensive use of
trenches, prepared positions, and
overhead cover in defensive
operations.
Formation of AT strongpoints
in depth along avenues of
logical approach.
AT strongpoints are formed in
depth along logical avenues of
approach for armor. These are made
up of motorized rifle, engineer, and
AT gun and missile units with
positions strengthened by mines,
ditches, and other obstac es.
Attachment of additional AT units
to frontline defensive positions.
In areas where there is a serious
armored threat, the enemy will
concentrate as many as 25 AT guns for
every 1,000 m of front.
Preparation of alternate
artillery positions.
In normal defensive operations, three
positions are prepared for each
firing battery.
Employment of roving artillery.
Roving guns and batteries are part of
normal defensive operations.
Large tank heavy units located
in assembly areas to the rear.
Tank units are held in assembly areas
for employment in counterattacks.
Preparation and occupation of
defensive positions.
In the defense, a security zone and
main defense area are prepared and
occupied.
Presence of demolitions,
contaminated areas, obstacl es,
minefield.
Demolitions, minefield, and other
obstacles are placed to cover AA
to the position.
Deployment of motorized rif e
units on good defensive posi tions.
Preparation of company
strongpoints on key terrain
Dominating terrain that has good
FofFs and is relatively inaccessible
to tanks usually is selected for a
defensive position.
c-7
Table C-2. Enemy defensive indicators (continued).
ACTIVITY
EXPLANATION
Prestocking ammunition and
engineer supplies and equipment
and fortification of buildings.
Prestocking ammunition reduces the
load on logistics throughout the
system once the battle begins,
Engineer tools and equipment may be
used to dig trenches and to erect
obstacles.
Entrenching and erecting bands
of wire.
Digging of trenches and the erection
of wire indicate preparations to hold
the position.
Presence of dummy artillery
observation points.
Dummy artillery observation points
preserve the effectiveness of the
actual artillery positions by
deceiving us as to their location.
Presence of dummy CPS.
Same as above.
Increased activity of SIGINT and
ESM units but decreased activity
of ECM units.
Increased activity is an attempt to
gain information about us before the
attack.
Early warning sites hardened.
When early warning sites are hardened,
it indicates the intention of those
forces to remain in place and to
protect an important facility.
CPS placed in hardened facili ty .
Same as above.
Additional AT units attached
to first eche on maneuver uni ts .
The enemy puts great emphasis on
killing tanks early. The enemy
believes that if the tanks can be
stopped, the attack will fail.
Establishment of a security
zone.
A security zone is established to
enable fortifications to be
constructed away from immediate danger
from our artillery and direct-fire
weapons.
Forward units disposed on
relatively wide fronts and depths
compared to offensive posture.
The defense zone of an MRR varies
from 10 to 15 km depending upon
terrain and the combat availability of
forces. MRR depth varies from 7 to
10 km.
C-8
Table C-2. Enemy defensive indicators (continued).
_ ACTIVITY _ EXPLANATION _
Displacement of logistics and Logistics and medical units are
units towards the rear. displaced to the rear to facilitate
combat force defense and counterattack
operations.
Displacement of artillery and SSM Artillery units are displaced toward
units towards the rear, the rear to reduce the chance that these
units will be lost or destroyed during
the preliminary stages of the battle.
During the defense, deep fires are not
as critical as during the offense.
Presence of large AT reserves Large AT reserves are established (with
with mobile obstacle MOD) to provide a quick reaction AT
detachments (MODS). capability.
Decreased communications The enemy places increased reliance on
intercepts (due to wire in the defense to increase security,
increased use of wire).
AD systems located in rear Destruction of logistics, command,
areas. and artillery units are high-priority
missions for our deep attacks,
Table C-3. Meeting engagement (movement to contact) indicators.
INDICATORS
ACTIVITY
EXPLANATION
Increased air and ground
reconnaissance along MCS.
Accurate information about routes
speeds the advance.
Road junctions, bridges, and
other key features are occupied
by either airborne forces or
forward detachments.
The enemy wants to control high-speed
armor AAs into our key areas.
Increased counterreconnaissance
activity.
Counterreconnaissance is an attempt to
prevent us from gaining information about
enemy dispositions and movements.
Forward movement of columns
dispersed laterally in two or
more MCS.
The enemy prefers to use march
formation when moving to contact.
c-9
Table C-4. Reinforcement indicators.
ACTIVITY
EXPLANATION
Movement of additional troops
toward the front.
This action increases enemy’s present
strength.
Increased traffic toward
present position.
Increased traffic brings up additional
troops, equipment, and supplies.
Identification of new units in
in the combat zone.
The presence of new units--in addition
to units already present-increases
enemy’s strength.
Additional CPS and supply and
evacuation installations.
Presence of additional units causes an
increase in the number of these
installations.
Logistical installations
moved well forward.
indicates preparation for the
resumption of the offensive after
reinforcement.
Table C-5. Delaying action indicators.
ACTIVITY
EXPLANATION
Withdrawal from defensive
position(s) before becoming
heavily engaged.
In delaying actions, units avoid
becoming decisively engaged.
Successive local counterattacks
with limited objectives.
Counterattacks are employed o assist
in disengaging first echelon units,
rather than to restore posit on.
Counterattacks broken off before
position is restored.
Same as above.
Maximum firepower positioned
forward; firing initiated at long
ranges.
Long-range fires facilitate the
delaying action.
Frontages up to four times that
normally assigned to units on the
defensive.
Forces conducting a delaying action
are normally assigned frontages in
excess of that normal for enemy units
on the defense.
Prepositioni ng of nuclear
weapons.
Prepositioning nuclear weapons
facilitates the delaying action.
Discovery of dummy minefield.
Dummy minefield are easier and faster
to prepare than active fields but
cause approximately the same delay to
advancing pursuers.
c-io
Table C-6. Withdrawal indicators.
Indications for withdrawal are generally the same as those for delaying
action with the addition of the following indicators,
ACTIVITY
EXPLANATION
Systematic destruction of bridges,
communication facilities and other
assets in enemy-held territory.
Deliberate demolition and scorched
earth tactics may be employed in
military withdrawals.
Establishment of a covering force
and rear guard.
Cover movement or withdrawal of
main body. The rear guard fights
delaying action, if required,
Increased use of night-driving
devices in all areas.
The enemy will attempt to withdraw at
night, if possible.
Minimum logistical and medical
services.
Nonessential logistics and medical
services are withdrawn first.
Marking withdrawal routes.
Movement and location of traffic
control units or parties to the rear
along the LOCS that are to be used by
major units.
Use of contaminated areas to
camouflage forces and cover
withdrawal .
Contamination hinders reconnaissance
and pursuit.
Presence of rear guard and
covering force.
Minimizes losses and permits main body
more freedom of movement.
Preparation of future defensive
lines behind main defensive
structure.
If the withdrawal is deliberate, the
enemy will want new positions ready
before withdrawing.
Jamming or destruction of
friendly air and ground
battlefield surveillance radars.
Battlefield surveillance radars are
capable of detecting withdrawals at
night or during conditions of poor
visibility.
Engineer reconnaissance and
MOD detected along LOCs, tunnels,
built-up areas, dams, and dikes.
Withdrawing forces will begin to
systematically destroy all crossings
and implement obstacles as they
withdraw.
C-ll
Table C-6. Withdrawal Indicators (continued).
ACTIVITY_EXPLANAT ION
Stockpiling of explosives at
central points. Distribution of,
and the establishment of, small
dumps of explosives and landmines
near bridges, possible abatis
sites, and other demolition target
sites.
Preparation of target for
systematic or hasty destruction.
Deception operations, such as
dummy radio traffic.
Smoke operations to cover
withdrawal operations.
Rearward movement of long-range
artillery.
Movement of small reconnai ssance
parties to the rear.
Displacement to the rear of
emitters associated with
logistics units. Destruction
or removal of logistic material
from existing depot and dump
locations to the rear.
Wit hdrawing forces will attempt to
de ay pursuit with obstacles,
Withdrawing units will attempt to
portray a normal defense.
Withdrawals must be unobserved to be
effective.
Long-range artillery will be moved
back to new positions before the
withdrawal takes place
Logistics are withdrawn first to avoid
being overrun during a possible
pursuit.
Withdrawing units need current
reconnaissance along w thdrawa
routes.
Same as above.
Table C-7. Nuclear weapons indicators.
ACTIVITY
EXPLANAT ION
Heavily guarded movement of
supplies, equipment, and material
Movement of supplies, equipment, and
material of nuclear nature requires
special security measures.
Heavily guarded installations.
Sites for storage of nuclear supplies
and the locations of del ivery units
are heavily guarded.
Preparation of heavy artillery
positions.
Primary and alternate positions for
nuclear del ivery artillery are
prepared before movement of the units.
Movement of small, heavily guarded
convoys, including closed vans,
with a high percentage of
automatic weapons.
Nuclear warheads are moved under heavy
security, usually in closed vans.
Escort vehicles are equipped with
machine guns.
Light aircraft circling over
moving convoy.
Nuclear warhead convoys often use
aerial radio relays to maintain
communication.
Movement of small groups of
heavily armed hel icopters
escorted by tact cat fighters.
Nuclear warheads may be moved by
helicopters, with guards and armed
helicopters as escort, Tactical
aircraft may provide air cover.
Movement of trai ers with rockets
or missile bodies.
Trailers are used to resupply missile
and rocket units.
Identification of tall, slender
objects, like towers, chimneys,
or narrow trees, not previously
in the area.
Ballistic missiles may be camouflaged
as towers, chimneys, or narrow trees,
such as poplars.
5
Large, well-guarded complexes,
including tanks, trucks, radars,
electronic equipment, generators,
and maintenance tents, located
wel 1 to the rear.
SSM units require extensive ground
handling equipment.
Evacuation or exclusion of
civilians from specific areas
suitable for nuclear storage or
delivery sites.
Civilians may be evacuated from
areas selected for nuclear storage or
delivery sites.
C-13
Table C-7. Nuclear weapons indicators (continued).
ACTIVITY
EXPLANAT ION
Presence of meteorological radars.
An END TRAY radar is part of the
organic equipment of both the free
rocket over ground (FROG) and SS-lc
SCUD systems, as wel 1 as other
nuclear-capable systems. (END TRAYS
also are found with conventional
artillery and AF units.)
Construction of FROG, SCUD, or
SCALEBOARD, SS-21 or SS-23
launch positions.
All of these systems have confirmed
nuclear capabilities. A survey-
controlled launch position is
constructed for each
transporter-erector-launcher (TEL)
before occupation.
Movement of SSM TELs to a launch
site within 1/3 to 1/2 maximum
range from the FLOT.
SSM TELs remain in camouflaged
positions until movement to the launch
area.
Passage of wind data from
mid-range position to a command
or technical element.
Enemy SSM accuracy is heavily
dependent on wind data.
Passage of a nonsense word over
command and selected fire
control nets.
May be a code word relative to
preparation for or execution of a
nuclear fire mission.
Volume of traffic on command nets
suddenly increasing then dropping
to a low level or standdown.
May reflect passage of strike warnings
followed by preparation for electro¬
magnetic pulse protective measures.
Identification of SSM
unit-peculiar equipment.
Presence of nuclear-capable systems.
Limited withdrawal of frontline
units without apparent tactical
reason.
Frontline units may withdraw for a
limited distance to avoid casualties
from close-in nuclear explosives.
Sudden and energetic digging
in enemy areas.
Prior to use of nuclear weapons,
frontline units may be ordered to dig
deeper foxholes or take other
individual protective measures.
C-14
Table C-7. Nuclear weapons indicators (continued).
ACTIVITY
EXPLANAT ION
Large concentrations of radios,
radars, and other electronic
equipment located in the vicinity
of suitable sites for guided
missile launching.
Concentration of equipment is
necessary to guide and control guided
missiles, which must be located in
close proximity of the launching site.
Sudden increase in communications
and electronic activity.
Increase may be incident to del ivery
of nuclear weapons, for example , 1 ast
minute orders and warnings, and use of
electronic guidance and control .
Use of smoke cover on front-line
troops.
Smoke may be used to protect troops
against thermal effects of weapons
used in close support.
Disappearance of known enemy
agents from specific areas.
Prior to nuclear attack of an area ,
agents may be ordered to leave the
area.
Increased or unusual air activity.
Delivery of nuclear weapons by air mar
require a temporary degree of lota 1
air superiority, special photo
mission, or practice flight pattern
runs by the del ivery aircraft.
Additional AT elements
with first echelon units.
Enemy will expect friendly forces
to react to indications of a nuclear
strike with an attack of tank-heavy
forces. Also, tanks have greater
survivability under nuclear
conditions.
Movement of small convoys from
the warhead storage areas.
Warheads being moved to be mated to
missiles.
Removal of antennas and other
equipment mounted on the
exterior of vehicles.
To prevent blast damage.
Lowering of windshie Ids on
vehicles.
See above.
Removal of camouflage nets.
See above.
Movement of vehicles to reverse
slopes.
See above.
C-15
Table C-7. Nuclear weapons indicators (continued).
ACTIVITY
EXPLANAT ION
Location of missile and free
rocket units within striking
distances.
Missile and free rocket units are
located within one third of the
maximum range from the 1 ine of contact
on the offense, and one half of the
maximum range on the defense.
Use of missiles or rockets
with high-explosive warheads.
Missiles or free rockets may be used
to deliver high-explosive warheads
either in a normal support role or in
a registration.
Location of very heavy artillery
within supporting distance of
front lines.
Nuclear delivery artillery is located
within one third of its maximum range
from the line of contract on the
offense, and one half of the maximum
range on the defense.
Registration of very heavy
artillery.
Registration may be conducted using
smoke and low charge or high explosive
projectiles prior to firing a nuclear
projectile.
Special or unusual activity by
frontline troops.
Frontline troops may construct
special positions, usually deep or
covered foxholes, before enemy use of
nuclear weapons.
AD weapons are deployed to
cover possible warhead storage
areas.
Enemy expects friendly air to attempt
to destroy nuclear warheads in
storage.
Use of high-explosive warheads
from SSMs-or heavy art illery in
a normal support role.
Indicates presence of nuclear-capable
systems.
Use of missile-associat ed terms
on selected radio nets
See above.
Preparation of future launching
positions.
See above.
Inability to locate previous y
identified missile units.
May be moving to f iring positions.
Additional administrative,
command, fire control, and
logistics nets identified in
the area of interest.
If these nets can be identified as
nuclear-related, they indicate the
presence of nuclear-capable units.
C-16
Table C-7. Nuclear weapons Indicator (continued).
ACTIVITY
EXPLANATION
Presence of heavy artillery,
Deployment of jamming assets.
203 mm SP gun, 240 mm SP mortar, and
towed 203 and 240 have nuclear
delivery capabilities, as do 152 mm SP
guns.
Jammers are deployed to protect
critical targets like nuclear units.
C-17
INSURGENT ACTIVITY INDICATORS
Anything that insurgents do to influence and direct a society toward
overthrowing its government is reflected by some action or indication, no
matter how subtle. These occurrences are referred to as insurgent
activity indicators. By recognizing these indicators, it is possible to
obtain the first clues to insurgent existence and then evidence of the
growth of the insurgent movement. Because there is a great deal of
legitimate activity, there is a requirement to determine which of the
various sociological, economical, political, and other activities
represent insurgent activity.
It is not possible to provide an all-inclusive listing of insurgency
indicators because there are too many possibilities existing in the many
nations of the world. The following indicators, however, do provide a
beginning framework for a detailed analysis of any particular country.
The greater the perception of an insurgency situation within a particular
country and the greater the knowledge of the insurgent involved, the
easier it is to identify the insurgent activity indicators.
These indicators serve as a guide for intelligence officers and
analysts in developing appropriate clues to insurgent activity in a
particular area. Isolated actions of seemingly little significance in one
area show a pattern of an emerging insurgency when coordinated with
reports of indicators from other areas. In developing indicators, or
using these suggested ones, it is important to remember that insurgent
strategy suddenly changes. The insurgent threat unfolds along altogether
different lines simultaneously or suddenly switches from use of military
force, for example, to a political example, to a political offensive.
Such a development is dangerous if it makes the general situation appear
to be much less critical than it” really is. The development of
appropriate indicators not only indicates that an insurgency or potential
insurgent situation exists, but also identifies any problems and
dissatisfaction of the people. The elimination or effective control of
insurgency is based on coordinated internal defense and development (IDAD)
programs which address identified problems or potential prob iems. Before
these programs are developed, the threat is defined. To define the
threat, you first establish insurgent activity indicators.
RURAL INSURGENT ACTIVITY
A rural area includes all farming areas, any town or village up to
5,000 people, and any town or village up to 20,000 people with a
farm-based economy where the townspeople, if not engaged in farming, earn
their livelihood in agricultural service industries. In such areas, where
the interests are so interdependent, insurgency indicators would be
simi lar in both the town and countryside. This is not to say that rural
insurgency is not directed by urban insurgents and coordinated with urban
insurgency; however, some theorists emphasize that the keyy to success is
the countryside and the rural population. In such cases, early insurgency
indi caters are found in the rural areas where the subversive insurgents
are concentrating their initial efforts.
C-18
During the development of a subversive insurgency, some of the first
indicators of latent or incipient insurgency appear in the rural areas.
While some of these indicators are rather obvious, some are not. For the
sake of simplicity, these indicators of insurgency are placed into four
categories: population, propaganda, commodity, and environmental.
Population
Population indicators are broken down further into subcategories of
general activity, insurgent-promoted activity, and activity directed
against the government.
General Activity . This includes--
°Identification of insurgents, their supporters, and sympathizers
who suddenly appear in, or move out of, an area.
“New faces in the community.
“Unusual gatherings among the population.
“Disruption of normal social patterns.
Insurgent-Promoted Activities . This includes--
“Refusal of peasants to pay rent, taxes, or loan payments or
unusual difficulty in the collection of same.
“Trends of demonstrated hosti I ity on the part of the local
population toward government forces.
“Occurrence of actions previously considered taboo by the populace.
“Disappearance of the population from or avoidance by the peeple of
certain areas.
“Unexplained disappearance or dislocation of young people.
Activity Directed Against the Government . This includes--
“Strangers attempting to join local security forces.
“Reports of the people being approached for purposes of
intelligence recruitment.
“Unusual short absences of government employees.
“Failure of police and informant nets to report properly.
“Growth of general hostility toward the government.
C-19
"Unexplained destruction or loss of government identification
papers or passports and increased forgeries thereof,
° Closing of rural schools.
“Murder and kidnapping of local government officials.
Propaganda
Propaganda indicators are broken down further into subcategories of
general activity and activity directed against the established government,
national military forces, and the educational system:
General Propaganda Indicator s. This includes--
"Dissident propaganda from unidentified sources.
"Increase in the number of entertainers with a political message.
"Increasing religious unrest.
"Increased agitation on issues for which there is no identified
movement or organization.
"Renewed activity by insurgent organizations thought to be dormant.
"Circulation of petitions advocating usual insurgent demands.
"Reports from other countries that the country is ready for
revolution.
Directed Against the Established Governmen t. This includes--
"Attempts to discredit and ridicule national or public officials.
"Attempts to discredit the judicial system and POI ice
organizations.
"Characterization of government leaders as puppets and tools of a
foreign government.
"Movement to remove strong anti insurgency leaders.
"Agitation against government projects and plans.
"Rumors designed to gain public acceptance o’f untruths about the
government or governmental leaders.
"Advocacy of popular front government.
C-20
Directed Against the National Military Force s. This includes--
0 Attacks which embarrass or ridicule military officials.
0 Characterization of military leaders as puppets and tools of a
foreign government.
Q Movement to remove strong anti insurgency leaders from the
military.
0 Propaganda directed toward youth to refrain them from joining the
military service or propaganda directed at soldiers to desert.
0 Characterization of the armed forces as the enemy of the people.
0 Civilian avoidance of and reluctance to cooperate with the
military.
Directed Against the Educational Syste m. This includes--
"Appearance of questionable doctrine in the educational system.
"Charges by students and others that the educational system is not
adequate and is only training the youth of the nation to do the
government’s bidding.
Commodity
Commodity indicators are broken down further into crops, animals, arms
and ammunition, clothing, drugs and medicine, and communication activity
subcategories.
C rops , This includes--
0 Diversion of crops from the market.
0 Unexplained decrease in the marketing of a given crop.
0 Increased reports of pilfering foodstuffs.
0 Strangers attempting to purchase crops or produce.
0 Farmers marketing a crop that is smaller than usual, yet showing
no signs of subsequent financial difficulty.
0 Discovery of caches of staple foodstuffs.
0 Increase in crop prices indicating the existence of an insurgent
taxing authority in the area.
Animals . This includes--
"Diversion of animals or meat from the market.
c-2 1
"Reports of loss of hides or diversion of hides from the market.
"Disappearance of wild game from an area in which it was previously
plentiful.
“Disappearance of pack animals or the appearance of unusual numbers
of pack animals in certain areas.
Arms and Ammunition . This includes--
0 increased loss of weapons by military and police forces.
"Increased thefts of weapons.
"Discovery of arms caches.
"Attacks on patrols resulting in loss of weapons and ammunition.
The above factors could be applied not only to weapons but also to any
similarly essential military goods.
Clothing . This includes--
"Unusual scarcity of any type of material that could be used for
footwear. This could include such items as hides of animals and old
tires, in addition to manufactured footwear.
"Discovery of caches of clothing or of materials which may be used
in the manufacture of clothing or uniforms.
Drugs and Medicine . This includes--
"Scarcity of herbs and plants used in or for drugs and medicine.
“Large-scale purchasing or theft of drugs and medicine and of the
herbs used in their manufacture.
Communications. This includes--
"increases in purchase and use of radios.
"Discovery of caches of communications equipment.
"Unusual increase in communications traffic in amateur radio
operations.
Environmental
The environmental indicators include--
"Evidence of increased foot traffic in the area.
"Increased travel within and into remote or isolated areas.
c - 2 2
“Unexplained trails and cold campsites.
“Establishment of new, unexplained agricultural areas, or recently
cleared fields.
“Unusual smoke, possibly indicating the presence of a campsite or
a form of communication.
“Concentration of dead foliage in an area, possibly indicating use
of camouflage.
“Presence of foot traps, spikes, and the like.
“Presence of obstacles such as those used in roadblocks and canal
blocks.
URBAN INSURGENT ACTIVITY
Indicaters of urban insurgent activity also are placed in the four
categor ies of population .propaganda, commodity, and environmental
indicatoors. Many of the same or similar indicators appear for both rural
and urban areas.
Popul ation
Population indicators are broken down further into subcategories of
general activity, insurgent-promoted activity, and activity directed
against the government.
General Activity . This includes--
“Increase in size of embassy or consulate staffs from a country or
countries which support insurgent groups.
“Increase in staff and activities in pro insurgency-oriented
embassies or consulates in neighboring countries, including unusual
patterns in nature and volume of external communications (both
in-country and out-of-country).
“Increased travel by suspected subversives to
pro insurgency-oriented countries or to countries notably under
insurgent influence.
“Influx of insurgent leaders, both foreign and domestic, into the
urban area.
“Reports of locals being trained in pro insurgency-oriented
countries.
“Increase in visitors from pro insurgency-oriented countries
(tourists, technicians, businessmen, and officials).
C-23
"Close connections between the diplomatic representatives of
pro insurgency-oriented countries and the insurgents.
"Disappearance of known or suspected insurgents and d iss ident
elements.
"Increase in insurgent youth gatherings.
"Hosting of trade fairs or similar activities by pro insurgency-
oriented countries.
"Return of nationals from travel or study in pro insurgency-oriented
countries.
"Increase in visits to urban centers by rural officials and leaders
from areas of unrest.
"Establishment of organizations (even very small) of unexplained
origin and of unclear or nebulous aims.
"Establishment of a new organization to replace an exist ing
organizationa i structure with identical aims.
"Appearance of many new members in established organizations like
labor unions,
"Attempts by new groups to obtain control of established
organizations.
"Infiltration of student organizations and unions by known
agitators.
"Appearance of new organizations with titles stressing patriotism,
grievances, or interests of underprivileged or minority groups.
"Reports of large donations to new or revamped organizations.
"Reports of payments to locals for engaging in subversive
activities.
"Reports of the formation of subversive paramilitary
organizations.
"Use of grenades or other explosives in terrorist acts.
"Reports of insurgent I ists of targets for planned terroristic
acts.
"Appearance of professional agitators in demonstrations that result
in violence.
"Evidence of the participanti on of paid and armed demonstrators in
riots.
C-24
Insurgent-Promoted Activities . This includes--
"Reported incidents of attempted recruitment of people to join new
movements or underground organizations.
"Unexplained unavailability or disappearance of doctors, printers,
and other special ists who may be working with and for the
insurgents.
"Habitual criminals and unruly youths who seem to be acting with
and for the insurgents.
"Increased unrest and agitation among laborers.
"Inability or refusal of people to pay taxes.
“Reports of extortion and other coercion by the insurgents to
obtain financial “donations” from the people.
“Disappearance of young men from the city.
Activity Directed Against the Government . This includes--
"Failure of pol ice and informant nets to report properly,
indicating sources are supporting the insurgents or are afraid of
them.
"Decreasing success of government agents in infiltrating subversive
organizations.
"Assessination or disappearance of government agents.
"Reports of increased attempts by insurgent representatives or
suspected subversives to make contact with local leaders or
government officials.
"Reports of attempts to bribe or blackmail government and law
enforcement employees.
"Reports of attempts to get classified information from government
officials or documents from government offices.
"Leakage of classified information to news media.
"Sudden improvement in financial status of certain government and
law enforcement employees.
"Fai lure of government raids on suspected subversive meetings or
headquarters apparently because of forewarning.
"Increased activity against the government and its police, minor ity
groups, foreigners, or similar groups.
C-25
"Demonstrate ions against government forces, scapegoat minority
groups, or foreigners, designed to goad government forces into
acting against crowds.
0 More articles or advertisements in newspapers criticizing the
government.
0 Growth of general hostility toward the government and law
enforcement agencies.
0 Occurrence of strikes in critical areas casting doubt upon the
ability of the government to maintain order and provide for the
needs of the people.
0 Unusual and unsatisfactorily explained absences of government
employees from their offices.
0 Sporadic, unexplained destruction, loss, or forgery of government
identification cards and passports.
0 Unexplained disruptions of public utilities.
0 Reports of extortion attempts on local leaders and businessmen.
0 Terrorist acts and threats against government and business
leaders.
0 Murder or kidnapping of government officials.
Propaganda
Propaganda categories are broken down further into categories of
general activity, and activity directed against the established
government, military and police, and educational systems.
General Activity . This includes--
"Worldwide propaganda by proinsurgency-or iented countries
denouncing conditions and blaming the government of the targeted
country.
"Appearance in-country of antigovernment slogans and pronouncements
by word of mouth, wall scribbling, posters, and leaflets.
"Letter writing campaigns to newspapers and government officials
deploring undesirable conditions and blaming individuals in power.
"Increased use of slogans pinpointing specific grievances.
"Increased use of petitions demanding government redress of
grievances.
C-26
0 Circulation of petitions and pamphlets which appear to follow the
beliefs and policies of a foreign power.
0 More rumors, publications, or leaders from areas occupied by
migrants which focus upon lack of official concern about poor
conditions.
0 More agitation and unrest within the urban population for which
there is no logical explanation,
0 Appearance of committees and organizations whose leaders do not
seem to be from the urban area, yet who purport to speak for the
citizens of that area.
0 increased appeals directed at intensifying general religious
unrest in countries where reiigious competition exists.
0 Mass demonstrations where participants voice standard Communist
demands.
0 Announcements by foreign countries that the concerned country is
ripe for “war of national iteration, ” or words to that effect,
0 Propaganda linking local ethnic groups with those in neighboring
countries.
0 Clandestine in-country radio broadcasts worded to appeai to those
with special grievances or to underprivileged ethnic groups.
0 Use of bullhorns, truck-mounted loudspeakers, and other
sophisticated equipment in “spontaneous”’ demonstrations.
0 Presence of photographers other than newsmen among demonstrators.
0 Widespread propaganda which appeals for sympathetic reception or
participation in strikes or demonstrations.
0 Rallies to honor “martyred” insurgents. Mass demonstrations
honoring revolutionary heroes or dates significant to insurgency.
0 Nationwide strikes tailed to demonstrate the strength of the
insurgent movement.
0 Sympathy strikes or demonstrations taking place outside the
country concerned.
Activity Directed Against the Established Governmen t. This includes--
"Radio propaganda from foreign countries, aimed at the target
country, accusing its government of failure to meet the needs and
desires of its people.
C-27
“Propaganda from foreign countries, aimed at the target country,
denouncing imperialism.
“Demonstrations and violence in foreign countries against
embassies, offices, and consulates of the target country or
countries which support its government.
“Spreading accusations that the government is corrupt and
completely out of touch with the people.
“Agitation against existing or proposed government projects and
plans.
“Accusations that the government is a pawn of a foreign government.
“Calls for a popular front government, including new parties.
“Character assassinations of top government officials.
“Movement to remove strong anti insurgency leaders from office.
“Strikes or work stoppages called to protect government actions.
Activity Directed Against the Military and Police . This includes--
“Spreading accusations that the military and pol ice are corrupt and
completely out of touch with the people.
“Character assassinations of military and police officials.
“Movement to remove strong anti insurgency mi I i tary and police
leaders from the office.
“Calling on the people to stop cooperating with the military and
police.
“Deliberate acts to provoke police reprisals during demonstrations
or strikes.
“Accusations of police brutality or ineffectiveness or claims that
government forces initiated violence when demonstrations end in
riots.
“Publication of photographs purporting to show repressive pol ice
practices.
Activity Directed Against the Educational System . This includes--
“Student unrest manifested by new organizations, proclamations,
demonstrations, and strikes against authority.
“Charges by students and others that the educational system is not
adequate and is only training youth to do the government’s bidding.
“Appearance of quest ienable doctrine in the educational system.
“Clamor for personne I changes in the educat ional system.
Commodity
Commodity indicators are broken down further into subcategories of
foods, arms and ammunition, clothing, and drugs.
£oods This includes--
“Scarce food supplies when there is no report of natural
impediments to agriculture.
“Decline of foodstuffs in a country or province where there is a
tolerated black market, wh ich indicates that the food is being
diverted.
“Sudden shortages of preserved foods or items of food requiring
minimal storage facilities.
“Failure of farmers to transport their products to the city,
indicating a fear of travel on the highways.
“Large-scale purchasing of foodstuffs which may be by purchasing
agents for an insurgent movement.
Arms and Ammunition . This includes--
“ Increase in assaults on police and military personnel which
results in thefts of weapons.
“Increase in thefts and purchases of arms, ammunition, and
explosives.
“Discovery of arms, ammunition, and explosives being clandestinely
manufactured, transported, or cached.
“Increased purchase and theft from salvage yards of metal products
like pipe, casings, wire, spikes, snd nails.
“Increased purchase of surplus military goods.
“Increase in demand for small arms and ammunition on the open
market.
“Reports of large-scale purchasing of weapons, ammunition, and
material used in their manufacture.
“Increase in pilfering of arms and ammunition from the government.
“Increase in the number of armed robberies.
C-29
"Reports of theft or sudden shortages of chemicals which could be
used in the clandestine manufacture of explosives.
"Appearance of arms manufactured in pro insurgency-oriented
countries.
Clothing . This includes--
"Unusual systematic purchase of clothing materials which could be
used for the manufacture of insurgent uniforms or footwear.
"Unusual scarcity of clothing or material used in the manufacture
of clothing and footwear.
"Distribution of clothing to underprivileged classes by
organizations of recent or suspect origin.
"Discovery of caches of uniform clothing.
p ruas This includes--
0 Scarcity of drugs and medical supplies on the market or black
market.
“Large-scale purchase or theft of drugs and other medical supplies,
"Diversion of shipments of drugs.
Environmental
The environmental indicators include--
"Apartments and housing being rented, but not lived in as homes.
"Slogans written on walls, bridges, and streets.
"Defacement of government and police information signs.
"Disappearance of electrical lines. Pollution of the urban area’s
water supply.
"Terror ist acts against physical targets like bridges, dams,
airports, or buildings.
"Changes in residence of suspected subversives.
"Discovery of message drops.
"Apartments and houses being used for purchases other than
residences.
"Increased smuggling of currency, gold, gems, narcotics, medical
supplies, and arms into urban centers.
C-30
“Reports that local currency is being bought up in world markets by
pro insurgency-oriented countries.
"Appearance of abnormal amounts of counterfeit currency.
"Increase in bank robberies.
"Work stoppages or slowdowns in essential industries.
"Marked decline in product quality in essential industries.
"Marked increases in equipment failures in essential industries.
"Mass strikes and sympathy str ikes in essential industries.
"Appearance of known agitators or suspected subversives in picket
lines.
"Escalation of peaceful strikes to violence against property and
nonstriking personnel.
"Explosions in essential utilities and industries,
"Roadblocks and mines on main lines of communication.
"Malicious damage to industrial products or factory mathinery.
C-31
APPENDIX D
ENEMY STRENGTH COMPUTATIONS
Enemy strength undergoes a continuous fluctuation between TOE-type
strengths and varying levels of force, unit, equipment, and personnel
strengths during the course of a battle, campaign, or war. These
fluctuations are a result of unit, personnel, and equipment losses and the
enemy’s ability or inability to provide suitable replacements quickly and
consistently.
Enemy strength computations provide a method for estimating the level
of combat effectiveness of enemy forces. It is computed in terms of
committed forces, reinforcing and supporting units, and the number of
nuclear weapons and chemical and biological delivery systems suspected or
identified as being deployed within the friendly commandar’s AOS or Als.
Based on the analyst’s knowledge of enemy doctrine, OB, and current
information and intelligence on enemy dispositions, locations, and
capabilities, the numbers of committed, reinforcing, and supporting forces
is computed.
Once these enemy forces are determined, individual enemy units can be
identified or located and enemy strength computed. Personnel and
equipment strengths are described as percentages of known TOE-type
strengths, based upon reported enemy personnel and equipment losses and
known or estimated rates of replacement.
COMMITTED FORCES AND REINFORCEMENTS
Committed forces are those enemy ground units, currently in contact or
with which imminent contact is expected, whose area of employment is not
expected to change to counter the specific course of action selected by
the friendly commander. Committed forces may change disposition within
their area of employment, but no significant delay is involved in their
employment. Designation of enemy forces as committed forces depends
primarily upon their disposition, location at the time of the estimate,
the echelon at which the estimate is being prepared, and enemy doctrine.
Committed forces are either located, unlocated, identified, or
unidentified units.
Reinforcements are those enemy forces whose area of possible
employment against the friendly force depends on the friendly selection of
a specific course of action and on enemy capabilities. Reinforcements
include all known enemy forces which are neither committed against a
friendly force nor committed outside the friendly zone or sector, but
which reasonably are considered capable of closing with the friendly force
in time to affect the accomplishment of the mission.
Estimates of enemy NBC capabilities usually are prepared at field army
and higher headquarters. Units below field army level usually lack the
means to gather the information to make such estimates. They use the
D-1
estimates of the higher headquarters and modify them with available
information.
The determination of enemy NBC operation capabilities is based
primarily on estimates of numbers and types of weapons and amount and
types of agents available, knowledge of enemy doctrine, past experience,
and estimates of enemy capabilities involving the employment of ground
troops. It is rarely possible to estimate what portion of the available
enemy NBC effort may be used against a division or corps within a field
army or a command in the COMMZ. It is also rarely possible to estimate
the number of nuclear weapons the enemy is capable of using within a
period as short as one day. The period selected is a month or longer,
depending on the available information and past experience. The statement
of the enemy’s capability of using chemical and biological agents includes
the amount, type, and delivery means of available agents.
COMPUTING COMMITTED ENEMY UNITS
The commander and the operations officer use the information the G2 or
S2 provides on enemy comnitted forces and reinforcements for planning and
conducting tactical operations. Accurate information is particularly
important during the commander’s analysis of opposing courses of action.
For example, in planning for an attack, an overestimation of committed
enemy forces and an underestimation of enemy reinforcements could cause
the friendly commander to attack with a small reserve. The intelligence
officer’s error in computing committed and reinforcing forces could al low
the enemy to counterattack with an unexpectedly strong force, inflicting
unacceptable casualties upon the friendly force.
All uncommitted enemy forces are considered as reinforcements if they
are committed in time to affect the accomplishment of the mission. If
there is doubt as to whether an enemy unit is committed or reinforcing, it
is considered as a reinforcement. This reduces the risk of surprise.
Expressing strength in number of units, by type, within an enemy force
is stressed because it is a simple, reliable, and readily understood
method of computing enemy strength. At the same time, the OB analyst
cannot ignore individual unit strength computations. This is particularly
important in arriving at a true picture of the enemy’s strength.
Strength by type of unit includes the total number of enemy units
listed by category and type. Normally, enemy units are counted down to
and including two echelons below the friendly force’s level of command.
Some special purpose units three echelons below may also be counted.
Usually, an intelligence officer accounts for committed enemy forces
by the size of the enemy unit which is opposing the friendly elements. At
the most basic level, state the actual number of weapons systems. Against
an enemy army, a division G2 usually counts committed forces in terms of
battalions;a corps G2 in terms of regiments; and field army and higher
headquarters, in terms of divisions. At headquarters above field army, a
statement of the number of armies and army groups is included. For
D-2
example, “The committed forces facing this army group consist of one army
group (3 combined arms armies with a total of 11 MRDs and 3 tank
divisions). . . When committed forces, such as guerrillas, do not have
a known organization, their strength is stated in total numbers. All FS
weapons systems avai table to the guerrillas, including tanks, infantry
fighting vehicles (IFVs), and artillery, also are listed and expressed in
terms of total numbers.
The brigade S2 considers as committed forces the first and second
echelon companies of enemy MR, tank, or reconnaissance battalions in
contact with the brigade. Although the enemy company is the basic sized
unit used by the brigade S2 in accounting for committed forces, the S2
also accounts for smaller units which have been located as separately
employed.
The battalion S2 considers as committed forces the first and second
echelon platoons of the enemy MR, tank, or reconnaissance companies in
contact with the battalion. Although the enemy platoon is the basic unit
used by the battalion S2 in accounting for committed forces, available
intelligence frequently does not enable the individual platoons composing
the enemy company to be located. Therefore, the battalion S2 considers
that a located enemy company normally consists of three platoons; a
company (-) consists of two platoons. Table D-1 shows the process of
counting committed forces in the defense and in the offense.
The designation of enemy units as committed forces depends primarily
on their disposition and location at the time the estimate is made. Enemy
unit identification facilitates determining if a particular unit is the
reserve of elements in contact with the brigade or battal ion.
When an enemy unit of the size used in accounting for committed forces
is in contact with two adjacent friendly units, the entire enemy unit is
considered to be committed by the G2 or S2 of both friendly units. For
example, if an enemy battalion is in contact with elements of two adjacent
US divisions, both division G2s consider the entire battalion as committed
against their respective divisions. This points up the need for correct
identification and accurate strength computation at each echelon.
All ground FS weapons organic to the enemy MRB or MRR are usually
referred to as normal regimental artillery and are always considered to be
in support of committed forces. That is, each committed unit is assumed
to have available to it its normal proportion of the available supporting
weapons organic to the regiment. These weapons, therefore, need not be
enumerated unless desired. FS weapons not organic to enemy motorized
battalions or regiments which are identified as within supporting range
are enumerated as if in support of committed forces. In the event that
the forces committed against the brigade or battalion have no known TOE
(that is, volunteer or irregular-type units), all FS weapons which are
identified are enumerated.
D-3
Table D-1. Counting committed forces in the defense and offense.
When the US is in the defense,
THE
LOOKS AT
LOOKS FOR
MR
TK
RECON
Battalion
S2
1st Echelon Bns
Pits
Pits
Pits
Brigade S2
1st Echelon Regts
Cos
Cos
Cos
Division
G 2
1st Echelon Divs
Bns
Bns
Cos
When the
US is
in the offense,
THE
LOOKS
LOOKS FOR
MR
TK
RECON
Battalion
S 2
Between LD, LC and
the objective
Pits
Pits
Pits
Brigade S2
Between LD, LC and
the objective
Cos
Cos
Cos
Division
S2
Between LD, LC and
Bns
Bns
Cos
the objective
*Reinforcing units do not need to be expressed in the same units as
committed forces; they should be expressed in the simplest possible
terms.
*supporting artillery may be expressed as “a RAG (or DAG)” of _
battalions”, battery or battalion equivalents (by type). However, if
artillery has been located which is not a normal RAG or DAG asset, the
type and size unit must be expressed. For example, “supported by
a _ battalions, RAG or DAG,” artillery assets, augmented by
one battery of 203 mm guns and one battery of 240 mm mortars.
When enumerating enemy forces in a defensive posture, enemy security
elements forward of the combat outpost I ine are normally considered
reinforcements of the main defensive position until contact with these
security elements is made. The intelligence officer correctly identifies
the enemy's main defensive positions and is not deceived by security
forces. The security forces normally become reinforcements for the main
defense after completing their security mission.
D-4
In addition to determining the enemy’s ground combat unit strength in
terms of committed forces and reinforcements, the G2 or S2 also considers
the enemy’s air and nuclear weapons strength, However, as estimates of
enemy air NBC warfare strength are usually prepared only at field army
level and higher, the G2 or S2 simply restates these capabilities in the
estimate.
Reinforcements are stated conveniently and meaningfully. For example,
if the opposing division has an MRR in reserve, this reinforcemen'<t is
referred to as a motorized regiment rather than three motorized
battalions. When enemy units--either committed forces or
reinforcements—are very much understrength, the estimated remaining
strength is expressed. Two divisions, each at half strength, are usual Iv
more formidable than a single division at full strength because of the
added flexibility of employment and the additional CS probably available.
A half-strength field artillery battalion is more than half as effective
as a full strength battalion,
When only two elements of a unit are located, they are counted as they
appear. By templating, it is possible to determine the approximate
location of the third element. Although this unit should not be counted,
the commander is advised as to its possible location. An exception to
this rule occurs, however, in situations where enemy doctrine normally
precludes elements of a unit operating independently of each other. For
example, if a US brigade S2 detects the presence of one MR company of a
Soviet MRB, then the remaining elements of the MRB are counted as
committed, albeit unlocated , enemy forces. This is because Soviet
doctrine normally precludes the MR companies of an MRB from operating
independently of each other .
COMPITT ING ENEMY REINFORCEMENTS
Factors derived from analysis of past similar enemy movements
determine the time required for an enemy to move troops from one place to
another and commit them. The considerations described below are
applicable in training and as a point of departure for the development of
experience factors in operations against an enemy force.
To determine the time when the enemy employ an uncommitted unit, the
travel time from the unit location to a logical point where the unit can
be committed is calculated. To the travel time, add the closing time
(pass time of a column). Except when observation of enemy units is
continuous, it is assumed that any unit could have started to move
immediately after its last reported location. Therefore, to determine the
earl iest time at which the enemy can reinforce, add the travel plus
closing time to the time last observed. For example, if an enemy
reinforcement was last observed at 0800 hours, and it can deploy to
envelop the northern flank in one hour, it is assumed that the attack can
be launched as early as 0900 hours (0800 plus one hour). In the
exceptional case involving piecemeal commitment of enemy reinforcements,
consider only travel time. Forces which are committed piecemeal do not
close into an assembly area or attack position.
D-5
Because observation of reinforcements is rarely continuous, statements
of enemy reinforcing capabilities should include both the earliest time
and that time after starting movement when the reinforcement is
accomplished. For example, “’the enemy reinforces the attack with the 45th
MRR at 0900 hours, or one hour after starting movement. ” When the time
since the last report is greater than the time after starting movement,
only the time after starting movement is given. For example, “the enemy
reinforces the attack with the 45th MRR now or one hour after starting
movement." When the number of reinforcements is large or the enemy is
capable of reinforcing in several areas, reinforcing capabilities are
presented in tabular form. Table D-2 is an example of this. It shows the
enemy reinforcing the attack or defense with all or part of the following
units at the places and times indicated.
Table D-2. Examples of estimating reinforcements.
UNIT
PLACE
MOTOR
FOOT
45th MRR
RJ 6382
Now or 1 hr after
starting.
091205 Jun or 4 hr
5 min starting
movement.
RJ 8884
090930 Jun or 1 hr
30 min after
starting movement.
091605 Jun or 8 hr 5
min after starting
movement.
37th MRR
RJ 6382
091000 Jun or 2 hr
after starting
movement.
100740 Jun or 23 hr 40
min after starting
movement.
RJ 8884
090920 Jun 1 hr
20 min after starting
movement.
091430 Jun or 6 hr 30
min after starting
movement.
In selecting a logical point for reinforcement, consider the effects
of AO characteristics, such as AAs and logical enemy reactions to friendly
courses of action. For reinforcement of an attack capability, select
locations for commitment of second echelon and reserve forces for enemy
battalions and reg iments and forward assembly areas for enemy divisions
and larger units. For enemy units moving to reinforce a defense, select
defense or counterattack positions. For movements by aircraft, select
logical LZS or’ DZS from which the enemy forces can materially affect the
accomplishment of the mission.
The time required by the enemy to issue extra ammunition, make
detailed reconnaissance, issue orders, and deploy to a line of departure
is not normally considered because all these actions are completed before
starting the operation or simultaneously with movement.
The following guidance is applicable until you develop experience
factors against a particular enemy:
D-6
0
Compute foot marching time for all appropriate reinforcements.
Compute motor movement time only for distances greater than 10
kilometers (6 miles). If a unit is observed in trucks, compute only
the motor movement time.
0 Consider a foot march of more than 32 kilometers (20 miles) as a
forced march. Consider a motor movement of more than 280 kilometers
(175 miles) as a forced march for motorized units and a movement of
more than 224 kilometers (140 miles) as a forced march for tank
units.
0 Compute closing time at the night rate of march if a column begins
to close before the BMNT closing time; if a column begins to close
at or shortly after BMNT, use the day rate of march. If a column
begins to close before the EENT, use the day rate of march; if a
column begins to close at or shortly after EENT, use the night rate
of march.
0 Move and close the entire unit to move an enemy infantry
battalion. To move a unit of regimental or larger size, move and
close two-thirds of the combat elements; that is, two battal ions of
an infantry regiment, two regiments of an infantry division.
COMPUTING COMBAT STRENGTH
The following three situations illustrate the method for computing
combat strength, as discussed in the preceding paragraphs.
SITUATION 1
The 20th Infantry Division is advancing to the south. The advance of
the division is stopped by elements of two MRRs (8th and 12th) of the
enemy 16th MRD. Each of these MRRs has two MRBs in contact and one MRB in
the second echelon. The third MRR (96th) is in contact with the 72d
Infantry Division on the flank of the 20th Infantry Division. About 40
kilometers (25 miles) in rear of the 16th MRD and in the area of the 20th
Infantry Division objective, two MRRs (43d and 75th) of the enemy 12th MRD
are preparing field fortifications.
The four battalions of the 8th and 12th MRRs in contact with the 20th
Infantry Division are considered as committed forces by the 20th Infantry
Division G2. Regardless of the specific courses of action selected by the
commander of the 20th Infantry Division to continue the advance, the area
of employment of these four battalions in contact does not change
appreciably. The second echelon battalions of the 8th and 12th MRRs are
not considered committed since they are not in contact and are employed in
other areas. The 96th MRR is considered committed and mentioned in the
composition subparagraph of the OPORD, but only its second echelon
battalion is listed as a reinforcement by the 20th Division.
The other two battalions are committed against the 72d Division and are
not available as reinforcements against the 20th Division. The 43d and
75th MRRs of the 12th MRD are considered as reinforcements because these
units are not committed against the friendly force and are committed in
D-7
time to affect the mission of the 20th Infantry Division. Although the
two MRRs of the 12th MRD are digging field fortifications in the vicinity
of the division objective, the enemy commander employs these units against
either the 20th Infantry Division or adjacent divisions. Figure D-1 shows
this situation in a schematic sketch.
SITUATION 2
The 20th Infantry Division is attacking to the east. Enemy committed
forces are the 3d MRB, 3d GMRR, the 1st and 3d battalions of the 5th MRR,
and the 1st Battal ion, 7th MRR; the 2d Battalion, 33d GMRR, 2d Battalion,
3d GMRR, and the 3d Battalion, 7th MRR are committed against units on the
20th Infantry Division flanks. The 1st and 2d Battalion, 3d GMRR, 2d
Battalion, 5th MRR, and the 2d Battalion, 7th MRR are not in contact and
are second-echelon battalions which are employed against the 20th Infantry
Division. They are considered as reinforcements. The two enemy regiments
in the assembly area astride the 20th Infantry Division north boundary and
the enemy MRR south of the south boundary are also possible
D-8
reinforcements. From their locations and dispositions, it is apparent
that they are the 2d echelon regiments of the divisions committed against
the 20th Infantry Division. Depending on the course of action selected by
the commander of the 20th Infantry Division and plans of the enemy
commander, all or part of these enemy elements are employed against the
20th Infantry Division, at various times and places, in time to affect the
accomplishment of the division mission. Figure D-2 depicts this
situation.
SITUATION 3
This example discusses the determination of enemy strength opposing
the 1st Brigade, 21st Infantry Division, and each of its composite units:
the 1st Battalion, 69th Infantry; and the 1st Battalion, 70th Infantry.
Figure D-3 shows the 1st Brigade, 21st Infantry Division, with the 1st
Battalion, 69th Infantry, and the 1st Battalion, 70th Infantry forward
defending positions as indicated in a schematic sketch. Reports from the
D-9
Figure D-3. Schematic sketch, situation 3.
21st Infantry Division indicate the enemy has an unknown number of air and
nuclear weapons available.
The S2, 1st Brigade, determines enemy strength as follows:
"Committed Forces: 1st Brigade is opposed by elements of three
MR companies, one reconnaissance platoon, and one medium tank
company (13 tanks) supported by normal regimental artillery, plus
six 120mm mortars, six 122mm howitzers, six loom AT guns, and all
available air and nuclear weapons.
"Reinforcements: Enemy reinforcements available for commitment in
the sector of 1st Brigade are an unidentified MRB located in the
vicinity of Hill 250.
The three MR platoons northwest of the Highway 82 bridge are disposed
so that they logically constitute one MR company in contact with, and
committed against, the 1st Brigade. The reconnaissance platoon southwest
of Hill 200 and the MR company northeast of the Highway 82 Bridge are in
D-10
contact with, and committed against, the 1st Brigade and its respective
battalions. All three platoons of the company northeast of the Highway 82
bridge are considered as one company committed against 1st Brigade, since
brigades account for committed forces in terms of companies. The MR
company south of Chigger Woods is located so that it is, logically, the
reserve company of an enemy battalion in contact with 1st Brigade and is
therefore considered committed. The MR companies of the 25th and 23d
Regiments, located to the east and west of the 1st Brigade sector, are
totally committed against adjacent brigades and are, therefore, neither
committed nor available as reinforcements against 1st Brigade, 21st
Infantry Division. Twelve medium tanks are located in the vicinity of the
MR companies committed against 1st Brigade and are, therefore, also
committed. The S2, 1st Brigade is equally correct to account for these
committed medium tanks as three medium tank platoons or one medium tank
company. In addition to the 120mm mortars (organic) and the 100mm AT guns
and 122mm howitzer battery (both attached), the enemy MRB is supported by
the artillery group of its parent regiment. The enemy also has an unknown
number of air and nuclear weapons, which are employed in support of
committed forces.
The S2, 1-69 Infantry, determines enemy strength now opposing the
battalion as follows:
"Committed Forces: 1-69 Infantry is opposed by two MR platoons, one
reconnaissance platoon, and one medium tank platoon, supported by
normal regimental artillery, plus six 120mm mortars, six 122mm
howitzers, six loom AT guns, and all available air and nuclear
weapons.
"Reinforcements: Enemy reinforcements available for commitment in
the sector of 1-69 Infantry are an unidentified MRB located in the
vicinity of Hill 250 and an unidentified MR company and medium tank
platoon located in the vicinity of Chigger Woods.
One MR platoon is in sole contact with, and therefore committed
against, 1-69 Infantry. The MR platoon north of boundary 1-69 and 1-70
Infantry is counted as committed against both 1-69 Infantry and 1-70
Infantry. The medium tank platoon in the same vicinity is also in contact
with and therefore committed against both 1-69 Infantry and 1-70 Infantry.
The MR company and tank platoon located in the vicinity of Chigger Woods
which are considered as committed by S2, 1st Brigade could logically be
employed against 1-69 Infantry in time to affect the accomplishment of the
battalion mission and are therefore considered as reinforcements. The
discussion above concerning the battalion vicinity Hill 250, the normal
regimental artillery and nonorganic weapons in support of committed
forces, applies also to the determination by S2, 1-69 Infantry.
The S2, 1-70 Infantry, determines enemy strength now opposing the
battalion as follows:
D-ll
"Committed Forces: 1-70 Infantry is opposed by four MR platoons and
two medium tank platoons supported by normal regimental artillery,
plus six 120mm mortars, six 122mm howitzers, six 100mm AT guns and
all available air and nuclear weapons.
“Reinforcements: Enemy reinforcements available for commitment in
the sector of 1-70 Infantry are an unidentified MRB located in the
vicinity of Hill 250 and an unidentified MR company and medium tank
platoon located vicinity Chigger Woods.
The S2, 1-70 Infantry, considers the individually located MR platoons
vicinity boundary 1-69 Infantry and 1-70 Infantry in the same manner as
does S2, 1-69 Infantry. Two platoons of the motorized company northeast
of Highway 82 bridge are considered committed against 1-70 Infantry. S2,
4-80 Mechanized, could also consider two platoons of this company
committed against the battalion. The discussion concerning reinforcements
and supporting fires applies also in the determination by S2, 1-70
Infantry. (See Figure D-3).
D-12
APPENDIX E
TERRAIN ANALYSIS IN INTELLIGENCE PREPARATION OF THE BATTLEFIELD
The function of terrain analysis is to reduce the uncertainties
regarding the effects of terrain on combat operations. It allows the
commander to'see the battlefield” and the effects of weather on the
terrain in the AO. In order to accomplish terrain analysis, the
intelligence staff receives support from the engineer terrain teams or
detachments. To effectively use the terrain information developed by the
terrain team, intelligence personnel must understand basic terrain
analysis and its applications to the IPB process. In units where terrain
analyst assets are not available, the intelligence staff collects,
analyzes, and integrates terrain information into the commander’s
decision-making process.
TERRAIN ANALYSIS PROCESS
The terrain analysis process is paramount in prebattle support. Early
in the IPB process planners determine the terrain information required to
support the operations at all levels. Terrain analysis emphasizes the use
of graphics to depict the effects of the terrain on ground and air
operations. It considers the effects of weather on the terrain and how
weather influences operations. The Defense Mapping Agency (DMA) prepares
much of the data base that terrain analysts use. This DMA data is
produced in two standard formats: a planning terrain analysis data base
(PTADB) at 1:250,000 scale and a tactical terrain analysis data base
(TTADB) at 1:50,000 scale. These scales coincide with the planning and
tactical maps used by the US forces. DMA standard factor overlays
produced include--
"Surface configuration (slope).
"Surface drainage.
"Vegetation.
"Surface materials (soils).
Overlays produced depicting factors related to military aspects of
terrain (OCOKA) are-
"Concealment from aerial detection (summer and winter seasons) .
"Obstacles (microrelief).
“Bui It-up areas.
"Transportation.
"Key terrain.
"Cross-country movement (wet and dry conditions) .
E-1
These products have a wide dissemination, but are primarily intended
for use by the terrain teams in support of the IPB process.
TERRAIN FACTOR MATRIX AND TERRAIN ANALYSIS SUPPORT GUIDE
The terrain factor matrix and terrain analysis support guide are tools
for the analyst. They were developed through an analysis process whereby
terrain factors that impact on combat operations are identified and
correlated with specific types of combat operations and battlefield
functions. Figure E-1 shows a terrain analysis support guide. The
terrain factor matrix was introduced in Chapter 4 (see Figure 4-4).
THE TERRAIN DATA BASE
The focus of terrain analysis support in the prebattle is on providing
the combat commander with detailed planning graphics of various terrain
factors. These graphics are expedient, tailored to the mission, and
updated with the changing combat and weather situations. Information
concerning the types and sizes of units involved (both friendly and
enemy), number and types of vehicles and equipment, and type of operation
is needed in this developmental stage.
The process begins with the analyses of the basic terrain factors
(surface configuration, surface drainage, vegetation and surface
materials, built-up areas, and transportation nets). These products are
used to assess the existing situation and further used in combination to
develop the factors of OCOKA and other special purpose graphics. The
analyst produces overlays depicting terrain factors not found on
topographic maps. These factors include, but are not limited to, fording
sites, tree height, stem spacing, stem diameter and canopy closure,
micro-relief, and the effects of weather on soil . This information is
necessary in the development of the OCOKA graphics. The information is
gathered through on-site collection, aerial reconnaissance, photographic
interpretation and analysis, and other collateral sources.
Surface Configuration
Surface configuration portrays and describes the landforms and the
irregularities of the earth’s surface. Maneuver commanders need accurate
intelligence on the surface configuration of the terrain. The aspects of
the various landforms and surface irregularities affect movement of
troops, equipment, and materials from one point to another. Therefore, it
is necessary that the analyst prepare an accurate surface configuration
overlay.
There are three principal landform groups’:
"Plains (less than 150 m difference in elevation between the high
point and the low point and having more that 50 percent of the area
with slope less than 4 percent).
"Hills (150 to 600 m--with low hills of 150 to 300 m and high hills
of 300 to 600 m).
E-2
MILITARY ASPECTS
OF TERRAIN (OCOKA)
ELEMENTS OF TERRAIN
Ini-ORMATION
EXAMPLES OF TERRAIN
ANALYSIS PRODUCTS
Observation and
fields of fire
• Vegetation (summer and winter)
• Surfare configuration
• Battlefield environmental
Effects on the terrain
• Urban areas
■ Horizontal LOS
for DF weapons
and radar
• Emplacement suitability
and performance
ratings for ground
surveillance
Concealment and
cover
• Vegetation (summer and winter)
• Surface configuration
• Obstacles (micro relief)
• Battlefield environmental
effects on the terrain
• Urban areas
• Cover potential from
Direct or indirect fire
(good, fair, or poor)
• Concealment, potential
from horizontal observation
(good, fair or poor)
Obstacles
• Vegetation (summer and winter)
• Surface configuration
• Drainage characteristics
• Natural and manmade obstacles
• Micro-relief
• Surface material (wet and dry)
• Urban areas
• Location of exsisting
natural and manmade
obstacles
• Mobility potential on the
battlefield expressed in
GO, SLOW-GO and NO-GO
for both tracked and
wheeled vehicles
Key Terrain
• Urban areas
• LOCs
• Surface configuration
• Drainage characteristics
• Location of key terrain
features, both natural and
manmade. Examples are:
bridges, chokepoints, high ground,
key military Installations
Avenues of approach
• Vegetation (summer and winter)
• Urban areas
• Surface configuration
• Surface materials (wet and dry)
• Drainage characteristics
• LOCs
• Identification of areas where
movement of friendly and enemy
forces may occur
• Speed prediction
• LZs
• DZs
• Landing beaches
• NOE navigation
Figure E-1. Terrain analysis support.
“Mountains (greater than 600 m with low mountains of 600 to 1500 m
and h igh mountains greater than 1500 m) .
Major I and forms, naturally and culturally dissected land areas, and
micro-relief are depicted. Micro-relief includes escarpments,
embankments, cuts and fills, and ditches less than 2 m in height.
E-3
Relief i s the difference in elevations represented by contour lines,
hypsometric tints, shading, or spot elevations. Slope is the inclined
surface of a hill, mountain, or any other part of the earth’s surface.
Slope is shown in three basic categories:
“Map unit A equals 0-30 percent slope, where the distances between
contour lines can be as narrow as the lines for 30 percent or
wider. Movement and maneuverability are generally unrestricted
except in local areas.
“Map unit B equals 30-45 percent slope, where the distances can be
as narrow as 30 percent or narrower to 45 percent. Movement for
vehicles in these areas is very slow. Maneuverability is difficult
for tracks and large-wheeled vehicles.
“Map unit C equals greater than 45 percent slope, where the
distances between contour lines are narrower than those for 45
percent. Movement is generally precluded and maneuverability is
extremely I imited. These areas are usually designated as NO-GO
areas for most vehicles.
Figure E-2 shows the three basic categories of slope on a terrain and
weather factor combined overlay. These categories may be further divided
to obtain a more descriptive analysis.
E-4
Slope can be expressed in three ways: first as a slope ratio (sometimes
called gradient) represented as a fraction; second, as a degree of slope
labeled in degrees; and third, as percent of slope. The best method of
representation is the percent of slope. Figure E-3 shows how to calculate
percent of slope.
E-5
Percent of slope is represented in the three categories described.
Use a slope template or slope calculator to assist in determining slope
categories.
A slope template or slope calculator is a device used for finding
areas within a given class or slope on a topographic map. Many slope
calculators have been made by various terrain detachments. These
calculators show different contour densities to be used on maps at various
scales with various contour intervals. They are usually reproduced by the
photo lab on transparent plastic. Figure E-4 shows examples of six
different slope calculators combined into one.
There are no significant weather effects on surface configuration.
Most changes to surface configuration occur over long periods of time or
as a result of a natural or artificial catastrophic event.
Surface Drainage
With the concept of rapid mobility, it is vital for commanders to know
what watercourses exist in their AO. Surface drainage is not just
identifying rivers on a map. Military planners need to know types of
watercourses, watercourse characteristics, conditions of the surrounding
area, and artificial features along the watercourse. Figure E-5 shows a
sample watercourse and water body data card. It is essential to military
operations that analysts consider seasonal and short-term weather effects.
Watercourses are classified into four types: perennial , intermittent,
ephemeral , and tidal . There are also 7 drainage patterns. These are
dendr itic, trellis, radial, annular, rectangular, parallel, and pinnate.
Drainage patterns provide information on surface materials (soil types and
geologic structure) and surface configuration. Figures E-6 through E-12
show the different drainage patterns.
Detailing is important in the preparation of the surface drainage
overlay. Include a stream regime in the marginal information. This is a
brief descriptive analysis of the prevalent drainage system(s) in the
area. Rivers are identified as having a gap width greater than 2.84 mm
and a length greater than 20 mm. Streams and canals are classified by
type (perennial, intermittent, ephemeral or tidal) and by size. There are
three sizes of streams:
"Less than .09 mm gap width.
"Greater
than
.09
mm-less
than .36 mm gap width
“Greater
than
.36
mm gap
width.
E-6
Each section, A through F,
is actually a separate calculator.
Select one section for an example.
To measure a 45 percent slope-
Use the contour density in section U C,”
because you are given a map with:
• an RF of 1:25,000,
and
• a contour interval of 20 ft.
Figure E-4. Slope calculator examples.
E-7
Figure E-5. Watercourses and water bodies data.
A random developed, tree-llke pattern composed of branching tributaries to a main stream. It is
the most common pattern and is characteristic of essentially flat-lying and relatively
homogeneous material.
Figure E-6. Dendritic drainage pattern.
A modified version of the dendritic pattern. Main streams generally flow parallel with the
tributaries Joining at right angles. This pattern is indicative of bedrock structure where rock strata
have been folded and main streams now follow the strike of the rock units.
Figure E-7. Trellis drainage pattern.
E - 9
This pattern is characterized by a network ot channels, almost parallel, flowing away from a central
high point. It is found on dome structures, Isolated round hills, or volcanic cones.
Figure E-8. Radial drainage pattern.
Usually associated with radial drainage, as where sedimentary rocks are upturned by a dome
structure. Joints or fractures may control the flow of the tributaries to provide a parallel aspect
Primary drainage will circle around a central high area.
Figure E-9. Annular drainage pattern.
E-10
Sometimes called angulate, (rectangular dendritic or angular dendritic) this pattern js also a
modified version of the dendritic pattern. It Is characterized by abrupt, close to 90 degree, changes
in stream directions and distinct obtuse or acute angles of stream juncture. This pattern is
generally caused by faulting or jointing of the underlying bedrock. It is usually associated with
massive igneous and metamorphlc (intrusive) rocks, though it may be found in any rock type.
Figure E-10. Rectangular drainage pattern.
This drainage pattern is characterized by major streams that are trending in the same direction.
Parallel streams are indicative of gently dipping beds of uniformly sloping topography. Tributaries
characteristically join the mainstream at approximately the same angle. Extensive, uniformly
sloping basalt flows and young coastal plains exhibit this drainage pattern. On a smaller scale the
slopes of linear ridges may also reflect this pattern.
Figure fll. Paraffer dridnage pattern.
This Is a hybrid form of a fine dendritic pattern, it strongly resembles a feather structure in
appearance. The gullies have steep, nearly vertical walls, profusely rilled with possible pinnacle
development. The bottoms are generally flat and broad.
Figure E-12. Pinnate drainage pattern.
An important consideration of streams and rivers are crossing sites
for fording, swimming, and bridging, and bank conditions. Most trucks can
ford depths up to three feet, most tanks up to four feet. Velocity should
be less than five feet per second. Vertical banks greater than one foot
stop trucks and greater than four feet stop tanks. Figure E-13 shows a
sample surface drainage overlay. See terrain matrix (Figure 4-4) for
surface drainage applicability.
Precipitation has a tremendous effect on hydrologic features and
adjacent areas. It affects watercourse depths, velocities, and bank slope
conditions. Evaluate flood plains and areas subject to inundation. The
lack of precipitation also plays an important role in the evaluation of
rivers and streams. The absence of water in various channels and flats
provides concealed movement routes, however, use caution and give
attention to weather forecasting when considering these routes. Wind
affects velocity and surface turbulence on the larger watercourses.
Vegetation
Vegetation has a significant effect on many types of military
activities and is considered carefully in planning operations. There are
many ways vegetation affect military tactics, decisions, and operations.
Perhaps the most important is concealment. Concealment is the ability to
move troops, vehicles, and equipment without being detected from the
ground or air.
Vegetation is defined as the natural plant cover characteristic of an
area. There are four types of vegetation:
E-12
"Trees are greater than 3.05 m tall, perennial wood plants, single
sterrrned, with a definite crown shape. They are either of the
deciduous or coniferous variety.
"Scrub and shrub. Scrub is vegetation noted by its stunted growth
due to poor soil or climatic conditions. Shrub is the undergrowth
of the forested areas, normally the dominant vegetation. It is
either deciduous or coniferous.
"Grasses are all non-woody plants (grasses and forbs) . hey are
classified as tall or short grasses depending on height (less than
one meter is short, greater than one meter is tall).
"Crops are defined as cultivated vegetation (vineyards, arms,
plantations, orchards, and fields).
Ground reconnaissance of vegetation provides the analyst with the
necessary vegetation information to determine concealment possibilities.
Reconnaissance allows the analyst to take precise measurements, thus
producing a graphic or greater accuracy. Current aerial photography is
E-13
essential to accurate analysis of vegetation. The best altitude for
photography for this analysis is less than 12,500 feet for accuracy within
10 percent. Altitude should not exceed 16,000 feet.
Areas are at least one square kilometer in size to be depicted on the
overlay. It is important to check the surface drainage overlay to ensure
the vegetation coincides on both overlays.
Vegetation annotated are those areas marked or those areas greater
than 5 mm in size. Stands with more than 60 percent coniferous vegetation
are designated as coniferous (C), with more than 60 percent deciduous
vegetation are labeled as deciduous (D), and stands with mixed vegetation
(C+D)) in 40-60 percent combinations are marked with an E. Use standard
symbology for other vegetation types (orchards, vineyards, and swamps).
Indicate height and canopy closure for each vegetation type.
Figure E-14 shows mapping capabilities for vegetation data elements in
the US, USSR, and Federal Republic of Germany. Figure E-15 shows a sample
vegetation overlay. See terrain matrix (Figure 4-4) for vegetation
applicability.
Concealment from aerial detection is determinedfrom vegetation type,
percent of canopy closure, stem spacing, and vegetation height. Canopy
closure is normally computed for forested areas and is defined as the
percentage of ground area covered by the tree crown area. Canopy closure
has four categories:
"Category 1 - 0-25 percent closure (poorest concealment).
"Category 2 - 25-50 percent closure.
"Category 3 - 50-75 percent closure.
"Category 4 - 75-100 percent closure (best concealment) .
In categories two and three, concealment depends on theforest mixture
of coniferous and deciduous trees. Tree height and canopy closure hinder
visibility, while stem diameter and vegetation density (stem spacing)
impede movement and maneuverability. Intervals less than 20 feet in
spacing greatly restrict maneuverability. Forested areas with stem
diameters greater than 2 inches stop wheeled vehicles (6-8 inches for
tracks). The vehicles are able to knock down the trees; however, the
brush pileup forms a significant obstacle.
Precipitation and wind affects vegetation by limiting or increasing
visibility. Precipitation also impacts on the effects of vegetation on
t raf f i ca b i I i ty. Consider the fire potential of extremely high
temperatures in conjunction with the lack of precipitation.
Surface Materials
The analysis of soils for military planners has two purposes: first
for the eng i neering and construction uses and second, for military
E-14
UNITED STATES
FEDERAL REPUBLIC
GERMANY
USSR |
DATA ELEMENT
1:250,000
1:50.000
1:250,000
1:50.000
1:200,000
1:50,000
1. Map unit Identification
and vegetation boundaries
Limited to
major
vegetation
boundaries
Limited to
major
vegetation
boundaries
Umited to
major
vegetation
boundaries
Umited to
major
vegetation
boundaries
Umited to
major
vegetation
boundaries
Umited to
major
vegetation
boundaries
2. Mean height to top
ot canopy
Woodland 3m
Scrub 3m
Woodland 3m
Scrub 3m
No
No
Yes
Yes
3. Percent canopy cloture
by season
Umited esti¬
mate tor major
vegetation type
Umited esti¬
mate for major
vegetation type
Umited
Umited
Umited
Umited
4. Number of stems per
hectare
No
No
No
No
No
No
5. Crown diameter
No
No
No
No
No
No
6. Mean stem diameter
No
No
No
No
Yes
Yes
7. Number of frees In each
stem diameter class per
hectare
No
No
No
No
No
No
8. Stem Spacing
No
No
No
No
Yes
Yes
9. Species Identification,
seasonality, and
distribution
No
No
No
No
No
No
Coniferous
Deciduous
Mixed only
Coniferous
Deciduous
Mixed only
Coniferous
Deciduous
Mixed only
Coniferous
Deciduous
Mixed only
10. Ground cover type,
percent of cover, and
height
No
No
No
No
No
No
11. Utter type and depth
No
No
Umited
Limited
Umited
Umited
12. Mean height to lowest
branches
No
No
No
No
Umited
Umited
13. A representative
transect
No
No
No
No
No
No
Figure E-
operations, spei
because of their
14. Map cap
cifically, tr
influence
labilities for
afficability
on drainag
vegetatioi
'. Surfac
1 e, veget
n data eiei
:e materi
ation, fie
nents.
al s are
;ld fortifi
important
cations,
and trafficability.
Surface materials are broken down into two groups, soi s ar| d rocks.
Soils are of unconsolidated parent materials and are often called deposits
or materials. Rocks are from consolidated parent material.
The Unified Soils Classification System is the system used ' n
determining soil types and characteristics. There are several
E-15
DIGIT
1st
2d
3d
Vegetation (Height)
TYPE
Forest Type
Coniferous
Deddlous
Mixed
Orchard
Canopy Closure (%)
0-25%
25-50%
50-75%
75-100%
Height (Meters)
0-4.5
4.5-20
Above 20
Figure E-15. Terrain factor overlay Vegetation Height.
CODE
c
D
E
F
1
2
3
4
1
2
3
E-16
characteristics needed to produce a surface materials (soils) overlay.
The analyst identifies soil composition as either fine-grained,
coarse-grained, or organic soils. Figure E-16 shows a sample soil
classification chart. Figure E-17 shows a surface material overlay that
further explains the classification designations. The first digit is the
predominant soil, the second digit is a characteristic description.
Surface roughness is depicted in the third digit. The following example
further depicts the classification system.
GW1 : Well-graded gravels, gravel-sand mixtures with little
or no fines. Soil has no roughness effect. This soil is
generally free of moisture. Soil depth is less than 5 meters.
Note: The subscript character indicates moisture and soil depth.
. . . indicates soil is normally moist.
_ . . indicates soil is normally wet.
_ indicates soil depth is less than 5 meters.
Other characteristics needed are an analysis of remo I d a b i I i t y , soil
depth in meters, moisture content, and soil horizonation . R e m o I d a b i I i t y
is the tendency for a soil to change strength with traffic. Soil depth is
measured in meters and is classified as--
0 Class 1 - 0 - .5 meters deep,
"Class 2 - .5 - 1.5 meters deep.
‘Class 3- 1.5- 3.0 meters deep.
"Class 4 - more than 3.0 meters deep.
Soil moisture content (the ability of the soil to retain moisture)
must consider daily and seasonal changes. Soil horizonation (or layering)
is the natural division of the unconsolidated material into three basic
layers. The three layers are: layer A - surface materials; layer B -
subsurface materials; and layer C - materials of the consolidated parent
material Other sublayers may be present.
A surface materials overlay breaks down the most probable soil types,
characteristics, and distribution. Depicted on a soils overlay (surface
configuration) are common soil types along with exposed rock outcrops (R),
peat (PT), evaporates (E) and permanent snowfields (PS).
SOIL TRAFFICABILITY
The capability of a soil to withstand traffic is referred to as the
soil strength or soil trafficability. Factors affecting soil
trafficability are soil type, characteristics and conditions (wet or dry),
vehicle type and vehicle cone index, and the soils rating cone index. A
rating cone index is the product of the measured cone index and the
remolding index. The vehicle cone index is the minimum soil strength that
permits a given vehicle to complete 1 pass and 50 passes over a section of
terrain. See TM 5-330 for the various vehicles and tables. The analysis
E-17
More than half of material la amatler No 200 eleve size | More than half of material la larger than No 200 ele*e size.
The No. 200 aleve alze la about the emalleat particle visible to the naked eye.
Major Divisions
Group
Symbols
Typical Names
Field Identification Procedures
(Excluding particles larger than 3 in
and basing tractions on estimated
weights)_
Wide rangeTTgrairrsIzesTnd
substantial amounts of all Intermediate
particle sizes
t
o
z
* c
I " I
* o I
5=8,
S - s « *
= N
£ c m
o
islf i
a £ m ^ £
® Z
c c
i§
O o
c • ■*»
I 5 1
oi =
GW
Well-graded gravels, gravel-sand
mixtures, little or no fines
GP
Poorly graded gravels or gravel-sand
mixtures, tittle or no fines
GM
E .o
I 1 = *
sill!
OilSso
Silty gravels, gravel-sand-sllt mixture
GC
Clayey gravels, gravel-sand silt
mixtures
sw
Well-graded sands, gravelly sands,
llttte or no fines
Predominantly one size or a range of
sizes with some Intermediate sizes missing
Non plastic fines or fines with low
plasticity (for Identification procedures
see ML bekiw)
Plastic fines (for Identification
see CL below)
Wide range In grain sizes and
substantial amounts of all intermediate
particle sizes_
Sands
More than hall of coi
traction Is smaller thi
sieve size.
(For visual classlflcatl
eg
Clean
(Little
no fin
SP
Poorly graded sands or gravelly
sands, little or no fines
Predominantly one size or a range of
sizes with some Intermediate sizes missing
Sands With
Fines
(Appreciable
amount
of fines)
D
Silty sands, sand-sIH mixtures
Nonplastic fines or fines with low
plasticity (for identification procedures
see ML below)
sc
Clayey sands, sand-clay mixtures
Plastic fines (for identification
procedures see CL below)
1
Identification Procedures on
Fraction Smaller than No. 40 Sieve Size
_
Dry Strength
(Crushing
characteristics)
DDatancy
(Reaction
to shaking)
Toughness
(Consistency
near PL)
Sills and Clays
Liquid limit Is
less than 50
ML
Inorganic silts and very tines sends,
rock Dour, silty or clayey fine sands
or clayey silts with slight plasticity
None to slight
Quick
to slow
None
CL
Inorganic days of low to medium
plasticity, gravelly clays, sandy days
silty clays, clean days
Medium
to high
None to
very slow
Medium
OL
Organic silts and organic silty clays
of low plasticity
Slight to
medium
Slow
Slight
•» O
£ J5 “>
usS
T> l£
C ^
« -o •
• 3 <0
£ S £
<0 o>
Inorganic silts, micaceous or
diatomaceous
Slight to
medium
Slow to
none
Slight to
medium
CH
Inorganic days of high plasticity,
fat days
High to very
high
None
High
OH
Organic clays of medium to high
plasticity, organic silts
Medium
to high
None to
very slow
Slight to
medium
Highly Organic Soils
Pt
Peat and other highly organic soils
Readily identified by color, odor spongy
feel and frequently by fibrous texture
Figure E-16. Unified soiT classification chart.
E-18
SURFACE MATERIAL (SOILS)
1:50,000
A
SOIL 11’PE
MAP UNil
fl ST TwO OlGlTS)
DESCRIPTION
Gw
Well-graded gravels, gravel-sand mixtures,
little or no lines.
GP
Poorly graded gravels or gravel-sand mix¬
tures, little or no lines.
GM
Silty gravels, gravel-sand silt mixtures.
GC
Clayey gravels, gravel-sand day mixtures.
SW
Well-graded sand, gravelly sands, little
or no lines.
SP
Poorly graded sands or gravely sands, little
or no lines.
SM
Silty sands, sand-silt mixtures.
SC
Clayey sands, sand clay mixtures.
ML
Inorganic silts and very fine sands, rock
flour, silty or clayey line sands, or
clayey silts with slight plasticity.
CL
Inorganic clays of low to medium plasticity
gravelly clays, sandy days, silty days,
lean clays.
OL
Organic silts and organic silty clays of
low plasticity.
MH
Inorganic silts, micoceous or diotomoceous
fine sandy or silty soils, elastic silts.
CH
Inorganic clays of high plasticity fot days.
OH
Organic clays of medium to high plasticity,
organic silts
PT
Peat and other highly organic soils.
RK
Rock outcrops.
EV
E vapor it es
X
Not evaluated.
PS
Permanent snowfields.
w
Open water.
SURFACE ROUGHNESS
MAP UNIT
(3iD DIGITS)
DESCRIPTION
0
No Data
1
No surface roughness effect
2
Area of high landslide potential
3
Stony soil with scattered surface rock
4
Quarry
E-19
of soil trafficability is used in determining cross-country movement and
vehicle maneuverability. (See Figures 4-5 and 4-6 for examples of
over lays.)
Precipitation affects trafficability by changing the physical
properties and characteristics of the soil and the consolidated parent
material . Wind also is important because it decreases the drying time of
inundated areas. Wind reduces visibility by creating dust plumes in
exceptionally dry areas.
MILITARY ASPECTS OF TERRAIN - OCOKA
Terrain analysis focuses on the military aspects of the terrain known
collectively as OCOKA. Military aspects of the terrain are observation
and fields of fire, concealment and cover, obstacles, key terrain, and
avenues of approach and mobility corridors.
Observation and Fields of Fire
Observation involves the influence of the terrain on reconnaissance,
surveillance (opt ical and electronic LOS), and TA. Intervisibility is
extremely important. Intervisibility is the unobstructed view from point
A to point B. It is the ability to see from one station to another
station. Vegetation is particularly effective in limiting observation on
plains and plateaus. Prominences that could provide a commanding position
are generally lacking. In areas bare of trees, long distance observation
is good. The rugged topography of hills and mountains offers variable
observation. Terrain masking is the concealment of areas from direct
horizontal optical and electronic LOS by terrain features. Masking plays
an important role in communications and surveillance techniques and
systems emplacement. Consider LOS ( intervisibility and masking effects)
for various electronic and optical systems. (See Figure 4-12.)
FofF is the effect that the terrain has on weapons and weapons systems
effectiveness. LOS is considered for LOS direct fire weapons. Indirect
fire should consider surface configuration at the target site. It is
important to indicate distance and direction of observation. For FofF
indicate direction, trajectory angle for indirect fire to clear vegetation
(or other obstructions) from a specific point, and the extent of the
firing fan. (See Figure 4-11.)
Concealment and Cover
Concealment is protection from air and ground observation. Cover is
protection from the effects of fire, both direct and indirect.
Concealment and cover is derived from the surface configuration,
vegetation, and built-up area overlays. Slopes greater than 30 percent,
dense forested areas, and large bui It-up areas offer good cover. Fair
cover is outl ined by slopes 10-30 percent, medium forest density, and
medium built-up areas. A medium built-up area is equal to nine square
kilometers. It is important to accurately calculate percent of roof
coverage of a built-up area when determining concealment. The best
E-20
concealment is described as 0-25 percent chance of detection . Concealment
is evaluated for summer and winter seasons.
Cover , concealment, or defilade in the plains regions is generally
poor. Those areas having low topographic features (micro-re | ief), such as
escarpments, cuts and fills, and embankments afford some protection. The
rugged terrain of the hills and mountainous regions provide abundant
opportunity for concealment and cover. Above the timberline movement
across most slopes or crests is exposed to view in many directions.
Obstacles
Obstacles are natural or artificial features that stop, impede, or
divert military movement and maneuverabil ity. Obstacles occur on the
ground and in the air. The effects of removing, overcoming, or bypassing
the obstacles must be considered in the planning of the overall
operation, Hills and mountains usually are considered obstacles to
movement and generally favor the defense. History records many cases in
which forces inferior in numbers and equipment have held off superior
attackers in mountainous areas. There have been many instances in which
such obstacles have been effectively achieved by moving over the hilly and
mountainous terrain instead of through adjacent corridors where the enemy
was prepared. However, factors unfavorable to troop movement must be
considered. These conditions include difficulty in movement, lack of
maneuvering space, and the vulnerability of the LOC. Consider vegetation,
built-up areas, and surface drainage, in addition to the surface
configuration and micro-relief features in determining obstacles.
Key Terrain
Key terrain is any feature or area, natural or artificial, that the
seizure or control of offers a marked tactical advantage to the occupant
over the opposing force. Examples of natural key terrain features include
DZS, high ground, route constrictions or choke points, and fording sites.
Manmade key terrain features are a little harder to define. These include
key bridges, communications and logistics sites, major built-up areas
(urban, industrial , or commercial), major transportation centers
(airports, rail facilities, ports and harbors, and roadway networks).
Significant military, political, or governmental facilities and
installations are considered key terrain.
It is important to be selective in determining what features are key.
Selective criteria includes the following questions: Will control of this
feature provide me with a tactical advantage over the enemy? Is control
of this feature crucial to the success of the mission? Is this feature
along a major LOC or in a major MC? How will weather affect this
feature? What size force can this feature accommodate and are there ready
access routes? Additional considerations in selecting key terrain
includes concealment and cover and observation and FofFs. It is important
to indicate why the selected features are considered key terrain and what
effect control has on friendly and enemy forces.
E-21
Avenues of Approach and Mobility Corridors
AAs and MCS are routes by which a force may reach key terrain or an
objective. AAs and MCs address maneuver support potential, degree of
canal ization, concealment and cover, observation and FofFs, obstacles, and
the access to key terrain and adjacent avenues or corridors. There are
three types of AAs: ground, air, and rear area AAs.
Ground Avenues of Approach . A ground AA is broad enough and contains
sufficient MCs to support rapid movement and maneuver of forces along its
entire course. It should be free of obstacles. If obstacles are present
they should be few in number and require reasonable engineer support to
remove them. The avenue also affords good to excellent concealment and
cover.
Air Avenues of Approach . These are much the same as ground avenues. They
should be free of obstructions or have adjacent corridors to permit bypass
of obstructions. It is important to consider avenues and corridors in
layers as to reflect different altitudes of approach. This considerate ion
would depend on the level and size of the operation.
Rear Area Avenues of Approach . These are avenues that provide the rap id
movement of rear threat elements and the additional service support
elements to the front I ines.
Note: It is extremely important to indicate the width of the avenues and
corridors and what size element can pass through. Note any major choke
points that canalize movement along the AA into designated MCs as key
terrain. (See Figure 4-13 for examples of AAs and MCs.)
THE MODIFIED COMBINED OBSTACLES OVERLAY
The MCOO is the graphic terrain analysis on which all other IPB
products are based. It is one of the two templates (the other being the
DST) that is always prepared at all echelons. At echelons where the IPB
process is more formal, the terrain analyst produces detailed combined
obstacles overlays and AA overlays that may be combined or modified to
form the basis of the MCOO. At lower echelons however, the MCOO is
normally prepared by the intelligence staff as a single graphic.
A combined obstacles overlay is made up of built-up areas, LOCS,
surface drainage, surface configuration (including micro-relief), surface
materials, and vegetation. These component factors reflect average
weather effects for wet and dry conditions. These features are outlined,
highlighted, or marked to show their significance to movement and
maneuverability. There are three movement categories: NO-GO, SLOW-GO,
and GO.
A MCOO is produced for the IPB process when key terrain features, AAs
and MCs for air and ground forces, and a friendly operations graphic are
added to the combined obstacles overlay. Detail depends on the level and
type of operation. The MCOO contains at a minimum registration marks,
classification, titling data, and a legend. As a general rule the
following information is depicted:
E-22
o
NO-GO terrain.
° SLOW-GO terrain.
° Bui It-up areas.
° LOCs.
° Rivers and water obstacles.
° Obstacles.
° Key terrain.
° AAs and MCs.
° Objectives.
CONCLUSION
Weather and terrain have more impact on the battle than any other
physical factor, including weapons, equipment, or supplies. The terrain
on which battles are fought presents opportunities to both sides. Most
battles are won by the forces that use the terrain and weather to their
advantage in both offensive and defensive operations. The resurgence of
terrain analysis in today's Army and the recognition of terrain as a
potent multiplier of combat power makes each of us responsible for terrain
information.
E-23
GLOSSARY
Acronyms and Abbreviations
AA
avenue of approach
AAA
air avenue of approach
AAG
Army artillery group
AD
air defense
ADA
air defense arti11ery
ADM
atomic demolition munitions
ADP
automatic data processing
ADPS
automated data processing system
adv
advance
AE
aerial exploitation
AF
Air Force
AFCENT
Al1ied Forces Central Europe
AFSCOORD
assistant fire support coordinator
A 1
area of interest
Al IF
Automated Installation Intelligence File
AKA
also known as
AMC
Army Materiel Command
ammo
ammunition
AO
area of operations
AOB
air order of battle
AP
antipersonne1
A PC
armored personnel carrier
appl
app1ication
approx
approximate1y
arty
arti11ery
AS
aeria 1 survei11ance
ASAS
all-source analysis system
ASL
authorized stockage list
ASPS
all-source production section
at
antitank
ATGL
antitank guided launcher
ATGM
antitank guided missile
AUD
arbitrary unit designator
Aug
August
AW
air warning
AWS
Air Weather Service
BAT-D battlefield deception
BDA battle damage assessment
bde brigade
BE basic encyclopedia
B1CC battlefield information coordination center
bks barracks
bldg building
BMCT beginning of morning civil twilight
BMNT beginning of morning nautical twilight
Glossary-1
BMP
designation of
a type
bn
battalion
BOMREP
bombing report
BTF
battalion task
force
btrv
battery
of Soviet armored personnel carrier
C
C 2
c 3
C 3= CM
CAA
ca I
CARVE
CAS
cav
CB
cc
CDP
cd r
C-E
CEWI
CFA
CG
cGy/hr
C-HUMINT
cl
CIA
CIAS
CID
C-IMINT
cm
CM&D
CML
COA
co
COL
COLT
comd
COM I NT
COMMZ
COMSEC
COMZEALAND
CONUS
coord
COP
COSCOM
CP
CPA
CPFL
CPS
coniferous
command and control
command, control , and communications
command, control , and cormnunications countermeasures
combined arms army
caliber
criticality, accessibility, recuperability, vulnerability,
and effect
close air support
cavalry
chemical biological
cloud cover
company distributing point
commander
Communications-Electron ics
combat electronic warfare and intell igence
covering force area
commanding general
centiGray hour
counter human intelligence
counter inte I I igence
Central Intelligence Agency
counterintelligence analysis section
Criminal Investigation Division
counter imagery inteligence
centimeter
countermeasures
collection management and dissemination
chemical
course of action
company
colonel
combat observation and laser team
command
communications intelligence
communications zone
communications security
Commander, Allied Land Forces, Zealand
Continental United States
coordinate
command observation post
corps support command
command post
collection planning aid
Contingency Planning Facilities List
characters per second
Glossary-2
CPT
CRT
CRTA
CS
CSA
CSG
C-SIGINT
Css
CTL
CTOC
CTOCSE
CTT
CUBIC
CUCV
cw
capta i n
cathode-ray tube
commander rocket troop artillery
combat support
corps support activity
corps support group
counter signals intelligence
combat service support
critical task list
corps tactical operations center
corps tactical operations center support element
commander’s tactical terminal
Commnon Users Baseline for the Intelligence Commnunity
commercial utility cargo vehicle
continuous wave
D
DA
DAG
DATEXT
DBMS
DCS
def
deg
DF
DIA
d i v
D 1 VARTY
DMA
DMz
DOD
DO I
DP
DS
DST
DTG
DTOC
DTOCSE
DZ
deciduous
Department of the Army
division artillery group
data extract
data base management system
Defense Communications System
defense
degrees
direction finding
Defense Intelligence Agency
division
division artillery
Defense Mapping Agency
demilitarized zone
Department of Defense
date of information
decision points
direct support
decision support template
date-time group
division tactical operations center
division tactical operations center support element
drop zone
E
ea
EAC
EACIC
EAM
ECB
ECCM
ECM
EECT
EEF I
EE I
evaporates (soil type)
each
echelons above corps
echelons above corps intelligence center
event analysis matrix
echelons corps and below
electronic counter-countermeasures
electronic countermeasures
end of evening civil twilight
essential elements of friendly information
essential element of information
Glossary-3
EENT
end of evening nautical twilight
EEOB
enemy electronic order of battle
elm
e 1 ement
EMCON
emission control orders
en
enemy
engr
engineer
EOB
electronic order of battle
EPL
ELINT parameters list
EPW
enemy prisoner of war
ESM
electronic warfare support measures
est
estimated
EW
electronic warfare
F
Fahrenheit
FA
field artillery
FAC
forward air controller
FAIO
field artillery intelligence officer
FBI
Federal Bureau of Investigation
FEBA
forward edge of the battle area
FIST
fire support team
FLOT
forward line of own troops
FM
field manual
FO
forward observer
Fof F
field of fire
FP
field post
FPN
field post number
FRAGO
fragmentary order
FRG
Federal Republic of Germany
FROG
free rocket over ground
FS
fire support
FSCOORD
fire support coordinator
FSE
fire support element
FSO
fire support officer
f t
feet
FVD
full unit designation
fvdfwd
forward
G1
Assistant Chief of Staff, G1
(Personnel)
G2
Assistant Chief of Staff, G2
(Intelligence)
G3
Assistant Chief of Staff, G3 1
[Operations and
G4
Assistant Chief of Staff, G4
(Logistics)
G5
Assistant Chief of Staff, G5
(Civil Affairs)
GE
Germany
GEOREF
Geographic Reference System
GMT
Greenwich Mean Time (Zulu)
GPS
grid producing source
GS
general support or general staff
GSR
ground surveillance radar
GTA
government training aid
Plans)
Glossary-4
HB
high burst
HD
horizontal ground distance
HF
high frequency
HHC
headquarters and headquarters company
HOTPHOTOREP
hot (high priority) photographic report
how
howitzer
HPT
high payoff target
HQ
headquarters
hr
hour
HUMINT
human intelligence
hv
heavy
HVT
high value target
hwy
h i ghway
1A
imagery analysis
ID
identification
1 DAD
internal defense and development
1 ED
imitative electronic deception
IEW
intelligence and electronic warfare
1 FV
infantry fighting vehicles
HR
intelligence information report
IMINT
imagery intelligence
inf
infantry
1NSCOM
Intelligence and Security Command
i nst 1
installation
intg
interrogation
1 NTREP
intelligence report
1 NTSUM
intelligence summary
1 PB
intelligence preparation of the
battlefield
1 PI R
initial programmad interpretation
report
IR
information requirements
ITAC
Intelligence and Threat Analysis
Center
JCS Joint Chiefs of Staff
J2 Intelligence Directorate
J3 Operations Directorate
KIA
killed in
action
km
kilometer
kph
kilometers
per hour
LIC low-intensity conflict
LOC lines of communication
LOS line of sight
LP listening post
LTG lieutenant general
LZ landing zone
Glossary-5
m
maint
MAJ
MAS[NT
ma x
MBA
MC
MCOO
MD
MDC I
MDCI SUM
mech
MED
METT-T
MG
Ml
Ml Jl
MIJIFEEDER
min
MISREP
mm
MOD
mort
MOPP
MORTREP
MOV
MP
MR
MRB
MRC
MRD
MRR
m/s
msg
msl
MSR
MTLR
mtr
mvr
meter
maintenance
major
measurement and signature intelligence
max i mum
main battle area
mobility corridor
modified combined obstacles overlay
map distance
multidiscipline counterintelligence
multidiscipline counterintelligence summary
mechanized
manipulative electronic deception
mission, enemy, terrain, troops, and time available
machinegun; major general
military intelligence
meaconing, intrusion, jamming, and interference
meaconing, intrusion, jamming, and interference report
feeder
minute or minimum
mission report
millimeter
mobile obstacle detachment
mor tar
mission oriented protective posture
mortar bombing report
military owned vehicle
military police
motorized rifle
motorized rifle battalion
motorized rifle company
motorized rifle division
motorized rifle regiment
meters per second
message
missile
main supply route
moving target-locating radar
motor
maneuver
NAI
NATO
NBC
NBCE
NCO
NLT
no
NSA
NTR
NW
named areas of interest
North Atlantic Treaty Organization
nuclear, biological, and chemical
nuclear, biological, and chemical element
noncommissioned officer
no later than
number
National Security Agency
nothing to report
northwest
Glossary-6
06
obj
OCOKA
off
OIC
OMG
OP
OPLAN
OPORD
OPSEC
org
order of battle
object
observation and fields of fire, concealment and cover,
obstacles, key terrain, avenues of approach, and mobility
corridors
officer
officer in charge
operational maneuver group
observation post
operations plan
operations order
operations security
organization
PERINTREP
PERINTSUM
PIR
PL
PLL
pit
PM
POL
pos
ps
Psns
PSYOP
pt
PTADB
ptl
PTR/P
periodic intelligence report
periodic intelligence summary
priority i ntelligence requirement
phase line
prescribed load list
platoon
provost marshal
petroleum, oils, and lubricants
position
permanent snowfields
positions
psychological operations
peat
planning terrain analysis data base
patrol
paper tape reader/punch
R
R&D
R&S
RAG
RATT
RC
RD
REC
RECCEXREP
recon
regt
res
RF
R11
ROIPB
rpt
RRII
RSTA
rock outcrops
research and development
reconnaissance and surveillance
regimental artillery group
radio teletypewriter
reserve component
road
radioelectronic combat (not a US term)
reconnaissance exploitation report
reconnaissarnce
regiment
reserve
representat ive fraction
request for intelligence information
rear operations intelligence preparation of the battlefield
report
response to request for intelligence information
reconnaissance, surveillance, and target acquisition
Glossary-7
/ s /
52
53
SA
SALUTE
SAM
SATRAN
SCARF
Sc I
SCUD
SEAD
SED
SHAPE
SHELREP
sig
SIGINT
S I GSEC
SIR
S I TDEV
S I TMAP
S I TREP
SLAR
SOP
SP
SSM
STANAG
str
SUPINTREP
SUPIR
Swo
TA
TAC-D
TACREP
TA I
TARDEV
TCAC
TCAE
TDA
TDI
TEL
TEMPEST
TF
tgt
Tl
tk
TLE
tng
TOC
signature
Intelligence Officer (US Army)
Operations and Training Officer (US Army)
special agent
size, activity, location, unit, time, equipment
(spot report format)
surface-to-air-missile
definition is classified (see FM34-60A (S-NFD))
standard collection asset request format
sensitive compartmented information
nickname of a missile system
suppression of enemy air defenses
simulated electronic deception
Supreme Headquarters Allied Powers Europe
shell report
signal
signals intelligence
signal security
specific information requirements
situation development
situation map
situation report
side-looking airborne radar
standing operating procedures
self-propel led
surface-to-surface missile
standardization agreement
strength
supplementary intelligence report
supplemental programed interpretation report
Staff Weather Officer
target acquisition
tactical deception
tactical report
target areas of interest
target development
technical control and analysis center
technical control and analysis element
target damage assessment
target data inventory
transporter-erector- launcher
an unclassified name for studies and investigations of
compromising emanations
task force
target
technical intelligence
tank
target location error
training
tactical operations center
Glossary-8
TOE
TPL
t r p
TSS
TTADB
TTY
TVA
UAV
UHF
Ul
UNCLAS
Unk
us
USAF
USAIA
USA I CS
USAREUR
Uses
USSI D
USSR
UTM
VCR
VDP
veh
VHF
v i c
WETM
WIA
WNA
wpn
yr
table of organization and equipment
time phase line
troops
target selection standards
tactical terrain analysis data base
teletypewriter
target value analysis
unmanned air vehicle
Ultra-high frequency
unidentified
unclassified
Unknown
United States
United States Air Force
United States Army Intelligence Agency
United States Army Intelligence Center and School
United States Army Europe
Unified Soils Classification System
United States Signals Intelligence Directive
Union of Soviet Socialist Republics (Soviet Union)
universal transverse mercator (grid)
videocassette recorder
video disk player
vehicle
very high frequency
vicinity
weather team
wounded in action
would not answer
weapon
year
Glossary-9
References
REQUIRED PUBLICATIONS
Required publications are sources that users must read in order to
understand or to comply with this publication.
Field Manuals (FMs)
FM 34-1 Intelligence and Electronic Warfare Operations
FM 100-5 Operations
RELATED PUBLICATIONS
Rslated publications are sources of additional information. They are
not required in order to understand this publication.
Army Regulation (AR)
105-31 Message Preparation and Processing
Field Manuals (FMs)
3-3 NBC Contamination Avoidance
3-12 Operational Aspects of Radiological Defense
3-22 Fallout Prediction
5-26 Employment of Atomic Demolition Munitions
21-26 Map Reading and Land Navigation
34-10 Division Intelligence and Electronic Warfare
Operations
34-25 Corps Intelligence and Electronic Warfare
Operations
34-37 Echelons Above Corps Intelligence and Electronic Warfare
Operations
34-40 (U) Electronic Warfare, Secret
34-60 Counter intelligence
34-60A (U) Counterintelligence Operations, Secret
34-80 Brigade and Battalion Intelligence and
Electronic Warfare Operations.
References-1
34-81 Weather Support for Army Tactical Operations
34-130 Intelligence Preparation of the Battlefield
90-2 Battlefield Deception
101-5 Staff Organization and Operations
101-5-1 Operational Terms and Graphics
101-10-1 Staff Officers Field Manual: Organizational ,
Technical , and Logistical Data
101-31-1 Staff Officers’ Field Manual: Nuclear Weapons
Employment Doctrine and Procedures
Joint Chiefs of Staff Publications (JCS Pubs)
JCS - Pub 1 Department of Defense Dictionary of Military and
Associated Terms
JCS - Pub 25 Title Unavailable, Top Secret.
Training Circulars (TCs)
34-41 Jamming Handbook
34-52 Intelligence interrogation
34-55 Imagery intelligence
Fieid Circular (FC)
1 oo-l 5-1 Corps Deep Battle
Standardization Agreements (STANAGs)
1059 National Distinguishing Letters for Use by NATO Forces
2003 Patrol Reports
2008 Bombing, Shelling, and Mortaring Reports
2014 Operation Orders, Annexes to Operation Orders, and
Administration and Logistic Orders
2020 Operational Situation Reports
2022 intelligence Reports
2019 Military Symbols
References-2
2029 Method of Describing Ground Locations, Areas and
Boundaries
2033 Interrogation of Prisoners of War (PW)
2073 NATO Intelligence Subject Code
2077 Order of Battle (Non-NATO Troops)
2084 Handling and Reporting of Captured Enemy Equipment and
Documents
2097 Nomenclature for Soviet Bloc Army Weapons and
Equipment
2103 Raporting Nuclear Detonations, Biological and Chemical
Attacks, and Predicting and Warning of Associated
Hazards and Hazard Areas
2104 Friendly Nuclear Strike Warning
2112 Radiological Survey
2118 Intelligence Estimate
2134 Offensive Air Support Operations
2149 Intelligence Request
3277 Air Reconnaissance Request and Task Form
3377 Air Reconnaissance Intelligence Report Forms
3596 Air Reconnaissance Target Reporting Guide
6004 Meaconing, Intrusion, Jamming, and Interference Report
STANAGs can be obtained from: Naval Publications and Forms Center,
5801 Tabor Avenue, Philadelphia, Pennsylvania 19120.
References-3
INDEX
Al. See area of interest
ADP. See automatic data processing
aerial fire support officers (FSO), 7-10
AirLand Battle, 1-1
area of operation (AO), l-l
deep attack, sample of, 1-2
HVT, 1-2
IPT, 1-2
intelligence support to
close operations, 1-3
daep operations, 1-3
rear operations, 1-3
all-source production section (ASPS), 2-2
analysis, 2-4, 2-17
area of operations, A-108
pattern, 6-9
annotated jntelljgence estimate, A-10
for stability operations, 1-4, A-26
applications programs, B-6
arbitrary unit designators, 3-28, 3-30
area of interest (Al), 1-4, 4-7
area of operations, 1-1, 1-4, A-108
area study files, 10-7
ASPS. See all-source production section
assessment, 2-17
attack options, 7-7
delay, 7-7
disrupt, 7-7
limit, 7-7
automatic data processing (ADP), B-l
automation support to intelligence analysis, B-1, B-4
current automated support systems, B-7
MICROFIX, B-7
TCAC, B-7
hardware, B-2
keyboard, B-3
modems, B-4
monitor, B-4
peripherals, B-4
printer, B-4
processor, B-4
storage device, B-4
video cassette recorders, B-4
video disk players, B-4
software, B-2
applications program, B-S
data base management system, B-6
operating system, B-5
word processing, B-S
avenues of approach and mobility corridors, 4-10, 4-16, E-22
Index-1
BAE. See battlefield area evaluation
battlefield area, 1-4
Al, 1-4
AO, 1-4
Cl, 1-4
Ew, 1-4
ECCM, 1-6
ECM, 1-6
ESM, 1-6
IEW mission, 1-4
one-up and two-down formula, 1-4
situation development, 1-4
make sound tactical decisions, 1-4
target development, 1-4
battlefield area evaluation (BAE), 1-4, 4-7, 7-6
battlefield information coordination center (BICC), 1-8, 1-9
biases, S-11
BICC. See battlefield information coordination center
blue element, 5-7
bombing, shelling, and mortaring report, A-87
canopy closure, E-14
capabilities, 6-1
cathode ray tube (CRT), B-4
CC. See cloud cover
checklists of white, red, and blue questions, 5-8
CIAS. See counterintelligence analysis section
civil-military operationa file, 10-9
close operations, 1-3
cloud cover (CC), 4-13, 4-22
CM&D. See collection management and dissemination
COA. See course of action
collecting, 2-2
collection management and dissemination (CM&D), 2-2
COLT. See combat observation and laser team
combat
effectiveness, 3-1, 3-5, D-1
forces, 10-14
observation and laser team (COLT), 7-10
combined
intelligence operation, 10-1
obstacle overlay, 4-6, 4-8, 4-12, 4-22, E-22
commander, 1-8
intent of, 4-6, 4-27, 4-30
committed forces, D-1
composition, 3-1, 10-13
concealment and cover, 4-8, E-20
conceptual model, 6-1
contents of an OB book, 3-9
Index-2
coordinate register, 3-22, 10-9
counter-human intelligence (C-HUMiNT), 9-2
counter-imagery intelligence (C-IMINT), 9-3
counterinsurgency, 10-1
counterintelligence (Cl), 1-4
analysis, 9-1
analysis section (CIAS), 9-1
C-HUMINT collection, 9-2
C-IMINT coi llection, 9-3
C-SiGINT collection, 9-2
EACIC, 9-1
ITAC, 9-1
rear operations, 9-2
counter-signals intelligence (C-SIGINT), 9-2
workstation, B-14
course of action (COA), 6-3
credibility, 2-14
of information, 2-15
critical nodes, 7-7
CRT. See cathode ray tube
current automated support systems, B-7
current propaganda and PSYOP file, 10-7
data base management system (DBMS) software, B-5
DBMS. See data base management system
decide. See targeting process
decision
briefing, A-144
points (DP), 4-30, 4-32, 7-5
supper t
matrix, 4-32
templates (DST), 4-1, 4-5, 4-26, 4-29, 4-32
decisive terrain, 4-10
deduction, 2-17, 2-18
deep attack, 1-1
sample of, 1-2
delay. See targeting process
deliver. See targeting process
planned target, 7-12
target damage assessment, 7-13
targets of opportunity, 7-13
destroy, 7-1
detect, 7-3, 7-8
aerial FSO, 7-10
COLT, 7-10
FIST, 7-8
forward area alerting radar, 7-10
moving targe’t-locating radar, 7-10
target location errors (TLE), 7-’11
Index-3
target selection standards (TSS), 7-11
directing, 2-1
disposition, 3-1, 3-2, 10-14
dissemination, 2-18, 10-12
disrupt, 1 -1, 7-1, 7-7
doctrinal, 4-7, 4-11, 4-24, 4-32
templates, 4-5, 4-14, 4-25, 4-27, 6-4
OP. See decision point
EACIC. Sea echelons above corps intelligence center
echelons above corps intelligence center (EACIC), 1-6, 9-1
effectiveness, 10-18
effects of weather, E-l
on mobility, 4-13
electronic
counter-countermeasures (ECCM), 1-6
countermeasures (ECM), 1-6
order of battle (EOB), 3-5
technical data, 3-1, 10-19
electronic warfare (EW), 1-4, 6-1
intelligence required for ECCM, 8-3
intelligence required for ECM, 6-2
intelligence required for ESM, 8-2
electronic warfare support measures (ESM), 1-6
enemy
combat effectiveness, 3-28
strength computations, D-1
combat effectiveness, D-1
committed forces, D-1
reinforcements, D-1, D-5
EOB. See electronic order of battle
evaluation, 2-4, 2-13, 10-10
event, 4-3, 4-29
analysis matrix, 4-14
template, 4-1, 4-5, 4-26, 4-28, 4-32
EW. See electronic warfare
factors analysts should consider, 5-1
feedback, 5-2
fire support team (FIST), 7-8
FIST. See fire support team
formats, A-1
analysis of area of o pe ra t io ns , A-108
annotated intelligence estimate, A-10
for stability operations, A-25
bombing, shelling, and mortaring reports, A-87
fragmentary order, A-127
initial and supplemental programmed interpretation report, A-59
Index-4
intelligence annex, A-29
intelligence estimate, A-1
intelligence report, A-43
intelligence summary, A-44
interrogation and translation report, A-61
meaconing, intrusion, jamming, and interference report, A-143
mission report, A-129
NBC attack reports, A-09
oral reports, A-144
decision briefing, A-144
information briefing, A-144
patrol report, A-126
periodic intelligence report, A-48
periodic intelligence summary, A-51
reconnaissance exploitation report, A-68
SIGINT tactical report, A-142
situation report, A-42
spot report, A-1
standard collection asset request format, A-136
forward area alerting radar, 7-10
fragmentary order, A-127
FSO. See aerial fire support officer
G2/S2, 1-8
G3/S3, 1-8
handbook of military forces, 3-8
hardware, B-2
high payoff target (HPT), 1-2, 4-31, 7-4, 7-6
high value target (HVT), 1-2, 4-24, 4-32, 7-6
historical studies, 10-20
hot file, 10-7
HPT. See high payoff target
WT. See high value target
identify enemy HVTs, 1-2
IEW. See intelligence and electronic warfare
incident map, 10-4
indicators, 6-3
information briefing, A-144
information requirements (IR), 2-2
initial and supplemental programmed interpretation report, A-59
installation handbook, 3-10
insurgency analysis worksheet, 10-7
insurgent situation map (SITMAP), 10-4, 10-5
integration, 2-17, 10-10
intelligence and electronic warfare (IEW) mission, 1-4
Index-5
ntelligence
analysis, B-1
ADP, B-1
automation support to, B-1
CRT, B-4
hardware, B-2
keyboard, B-3
modems, B-4
monitor, B-4
peripherals, B-4
printer, B-4
processor, B-4
software, B-2
applications program, B-5
DBMS, B-6
operating system, B-6
word processing, B-5
storage device, B-4
video cassette recorders, B-4
video disk players, B-4
annex, A-29
director, coordinators, and producers, 1-8
estimate, 10-2
dissemination, 1o-l2
evaluation, 10-10
integration, 10-10
interpretation, 10-11
recording, 10-4
area study files, 10-7
civil-military operations file, 10-9
coordinate register, 10-9
current propaganda and PSYOP file, 10-7
hot file, 10-7
incident map, 10-4
insurgency analysis worksheet, 10-7
insurgent SITMAP, 10-4
personalities and contracts map, 10-5
personality and organization file, 10-7
population status map, 10-5
resource file, 10-7
trap map, 10-6
file, 2-7
journal, 2-6
report, A-43
required for ECCM, 8-3
required for E(X, 8-2
required for ESM, 8-2
support to
combatting terrorism, 9-14
counterinsurgency, 10-1
Index-6
summary, A-44
workbook, 2-12
intelligence analysis system, !-6
BICC, 1-9
duties of, 1-8
commander, 1-8
coordinator, 1-8
director, 1-8
producers, 1-8
staffs, 1-8
G2/S2, 1-8
G3/S3, 1-8
TCAE, 1-9
TOC support element, 1-9
Intelligence cycle, 2-1
collecting, 2-2
CM&D section, 2-2
directing, 2-1
ASPS, 2-2
IR, 2-2
PIR, 2-2
dissemination, 2-18
processing, 2-3
analysis, 2-4
assessment, 2-17
deduction, 2-18
integration, 2-17
evaluation, 2-4, 2-13
credibility, 2-14, 2-16
pertinence, 2-14
reliability, 2-14
of source and agency, 2-1S
recording, 2-3, 2-6
intelligence journal, 2-6, 2-8
intelligence file, 2-7
intelligence workbook, 2-12
OB SITMAP, 2-10
working SITMAP, 2-9
intelligence preparation of the battlefield (IPB), 4-3,
application of, 4-5
commander’s intent, 4-6, 4-27, 4-30
event template, 4-6, 4-28, 4-32
MCOO, 4-6, 4-8
template, 4-6
battlefield area evaluation (BAE), 4-7
Al, 4-7
METT-T, 4-7
MCOO, 4-6, 4-8
avenues of approach and mobility corridors, 4-16
one-down, two-down rule, 4-11
4-34
Index-7
one-up, two-down rule, 4-11
concealment and cover, 4-8
key terrain, 4-8, 4-28
decisive, 4-10
observation and fields of fire, 4-8
obstacle, 4-6, 4-8, 4-10, 4-22, 4-25
OCOKA, 4-8
combined obstacle overlay, 4-6, 4-8, 4-12, 4-22
effects of weather on mobility, 4-13
in support of LIC, 10-2
line of sight analysis, 4-15
process, 4-1, 4-11, 4-24, 4-26, 4-34
decision support, 4-1, 4-5, 4-26, 4-29
doctrinal template, 4-14, 4-25, 4-27
event, 4-3, 4-29, 4-32
situation, 4-3, 4-5, 4-26, 4-32
products, 4-2, 4-5, 4-7, 4-11, 4-21
templates
decision support, 4-1, 4-26, 4-32
doctrinal, 4-14, 4-25, 4-27
event, 4-6, 4-28, 4-32
situation, 4-6, 4-26
terrain factor matrix, 4-11
threat evaluation, 4-1, 4-24
doctrinal template, 4-25
threat integration, 4-3, 4-21, 4-26
decision support template, 4-1, 4-26, 4-29, 4-32
decision points, 4-30, 4-32
decision support matrix, 4-32
TAI, 4-31
time phase lines, 4-30
event analysis matrix, 4-29
event template, 4-6, 4-28, 4-32
PIR, 4-27, 4-32
situation templates, 4-26
weather analysis, 4-1, 4-15, 4-21, 4-26
cloud cover (CC), 4-13, 4-22
precipitation, 4-13, 4-17, 4-23
visibility, 4-9, 4-13, 4-18
wind speed and direction, 4-22
weather factor analysis matrix, 4-24
intelligence support
of close operations, 1-3
of rear operations, 1-3
to combatting terrorism, 9-14
to deep operations, 1-3
interpretation, 10-11
interrogation and translation report, A-61
ITAC. See intelligence and threat analysis center
Index-8
keyboard, B-3
Key terrain, 4-8, 4-28, E-21
limit, 7-1 , 7-7
line of sight analysis, 4-16
logistics, 3-1, 3-4, 10-17
make sound tactical decisions, 1-4
MCOO. See modified combined obstacle overlay
MOCI. See multidiscipljne counterintelligence
MDCISUM. See multidiscipline counterintelligence summary
meaconing, intrusion, jamming, and interference report, A-143
METT-T. See mission, enemy, terrain, troops, and time available.
MICROFIX, B-7, B-8
Cl workstation, B-14
OPSEC workstation, B-14
TCAE workstation, B-13
topographic workstation, B-13
military installation file, 3-22
miscellaneous data, 3-1, 3-6
mission, enemy, terrain, troops, and time available (METT-T), 4-7
mission report, A-129
modems, B-4
modified combined obstacle overlay (MCOO), 4-6, 4-8, E-22
monitor, B-4
moving target-locating radar, 7-10
multidiscipline counterintelligence (MDCI)
estimate, 9-10
situation overlay, 9-7
summary (MODCISUM), 9-7
threat assessment, 9-7, 9-14
named areas of Interest (NAI), 4-32
neutralize, 7-1
nuclear, biological, and chemical (NBC) attack raports, A-89
observation and fields of fire, 4-8, E-20
observation and fields of fire, concealment and cover, obstacles, key
terrain, avenues of approach, and mobility corridors (OCOKA), 4-8, E-1
obstacles, 4-8, 4-10, 4-13, 4-25, E-21
one-down, two-down rule, 4-11
one-up and two-down formula, 1-4
one-up, two-down rule, 4-11
operating system software, B-5
operations security (OPSEC) workstation, B-14
Index-9
oral report, B-144
decision briefing, A-144
information briefing, A-144
order of battle, 10-12
combat forces, 10-14
composition, 10-13
disposition, 10-14
effectiveness, 10-18
electronic technical data, 10-19
factors, 3-1
combat effectiveness, 3-1, 3-6
composition, 3-1, 3-2
disposition, 3-1, 3-2
electronic technical data, 3-1, 3-5
logistics, 3-1, 3-4
miscellaneous data, 3-1, 3-6
personality file, 3-6
unit history, 3-6
strength, 3-1, 3-3
tactics, 3-1, 3-3
training, 3-1, 3-4
historical studies, 10-20
logistics, 10-17
personalities, 10-19
Phase I of an insurgency, 10-12
Phase II of an insurgency, 10-13
Phase III of an insurgency, 10-13
political structure, 10-14
records, 3-11
card, 3-17
coordinate register, 3-22”
military installation file, 3-22
organizational worksheet, 3-22
personality file, 3-18
SITMAP, 2-10, 3-14
strength worksheet, 3-22
unit workbook, 3-12
workbook, 3-12
references, 3-6
book, structure of, 3-7, 3-8
handbook of military forces, 3-8, 3-9
Installation handbooks, 3-10
miscellaneous, 3-10
STANAG 2077, 3-6
strength, 10-15
tactics, 10-16
training, 10-17
patrol report, A-126
pattern analysis, 6-9
patterns and signatures, 9-3
index-10
periodic
intelligence report, A-48
intelligence summary, A-51
peripherals, B-4
personalities, 10-19
and contacts map, 10-5
fries, 3-6, 3-18
pertinence, 2-14
Phase I of an insurgency, 10-12
Phase II of an insurgency, 10-13
Phase III of an insurgency, 10-13
PIR. See priority intelligence requirements
planned targets, 7-12
planning terrain analysis data base, 7-12
population status map, 10-5
precipitation, 4-13, 4-17, 4-23, E-12
printer, B-4
priority intelligence requirements (PIR), 2-2, 4-27, 4-32
processing, 2-3, 10-3
processor, B-4
rear and deep operations, 1-3
rear operations, 9-2
reconnaissance exploitation report, A-58
recording, 2-3, 2-6, 10-4
area study file, 10-7
civil-military operations file, 10-9
coordinate register, 10-9
current propaganda and PSYOP file, 10-7
hot file, 10-7
incident map, 10-4
insurgency analysis worksheet, 10-7
insurgent SITMAP, 10-4, 10-5
personalities and contacts map, 10-5
population status map, 10-5
resource file, 10-7
trap map, 10-5
red element, 5-6
reinforcements, D-1, D-5
reliability, 2-14
of the source and agency, 2-15
relief, E-4
report formats, A-1
intelligence estimate, A-1
spot report, A-1
resource file, 10-7
risk, 5-3
index-n
S2/G2, 1-8
S3/G3, 1-8
SIGINT. See signals intelligence
signals intelligence (SIGINT) tactical report, A-142
situation
development, 1-4, 6-1
capabilities, 6-1
courses of action, 6-3
indicators, 6-3
pattern analysis, 6-9
weighting indicators, 6-10
working SITMAP, 6-4
doctrinal templata, 6-4
report, A-42
template, 4-6, 4-26, 4-32, 7-5
software, B-2
spot report, A-1
staffs, 1-8
STANAG 2077, 3-6
standard collection asset request format, A-136
storage devices, B-4
strength, 3-1, 3-3, 10-15
computations, D-1
worksheet, 3-22
structure of an OB book, 3-8
suppress, 7-1
surface materials, E-14
tactical
operations center (TOC) support elements, 1-8, 1-9
terrain analysis data base, E-1
tactics, 3-1, 3-3, 10-16
target
damage assessment, 7-13
development, 1-4, 1-5, 7-1
attack options, 7-7
delay or limit, 7-7
disrupt, 7-7
decide function, 7-3
HPT matrix, 7-4
target selection standards, 7-4
detect function, 7-3, 7-8
aerial fire support officers, 7-10
combat observation laser teams (COLT), 7-10
first support teams (FIST), 7-8
forward area alerting radar (FAAR), 7-10
moving target locating radar (MTLR), 7-10
target location errors (TLE), 7-11
target selection standards (TSS), 7-11
index-12
deliver function, 7-4
IPB, 7-5
and BAE, 7-5
decision point, 7-5
situation template, 7-5
TAI, 7-5
terrain evaluation, 7-5
weather analysis, 7-5
location errors (TLE), 7-7
of opportunity, 7-12, 7-13
planned, 7-12
selection standards (TSS), 7-4, 7-7
value analysis, 7-6
critical nodes, 7-7
HPT, 7-6
HVT, 7-6
target areas of interest (TAI), 4-30, 7-5
targeting process, 7-1
functions, 7-1
decide, 7-3
HPT matrix, 7-4
target selection standards (TSS), 7-4
deliver, 7-4
detect, 7-3
objective of, 7-1
delay, 7-1
disrupt, 7-1
limit, 7-1
destroy, 7-1
neutralize, 7-1
suppress, 7-1
target location error (TLE), 7-11
target selection standards (TSS), 7-7, 7-11
TCAC. See technical control and analysis center
TCAE. See technical control and analysis element
technical
control and analysis center (TCAC), B-7
control and analysis element (TCAE), 1-8, 1-9
workstation, B-13
templates, 4-5
decision support, 4-1, 4-26, 4-20, 4-32
doctrinal, 4-14, 4-25, 4-27, 6-4
event, 4-6, 4-28, 4-32
situation, 4-6, 4-26, 7-5
terrain
analysis, E-1
avenues of approach and mobility corridors, E-
combined obstacles overlay, E-22
concealment and cover, E-20
effects of weather, D-1
Index-13
key terrain, E-21
modified combined obstacles overlay (MCOO), E-22
observation and fields of fire, E-2o
observation and fields of fire, concealment and cover, obstacles,
key terrain, avenues of approach, and mobility corridors (OCOKA), E-1
obstacles, E-21
planning terrain data basa,E-1
precipitation, E-12
tactical terrain data base, E-1
vegetation, E-12
evaluation, 7-5
factor matrix, 4-11
masking, E-20
military aspects of, E-20
avenues of approach and mobility corridors, E-22
concealment and cover, E-20
key terrain, E-21
observation and fields of fire, E-20
terrain masking, E-20
obstacles, E-21
threat
evaluation, 4-1, 4-24
doctrinal templates, 4-25, 4-27
integration, 4-3, 4-21, 4-26
decision support matrix, 4-32
event analysis matrix, 4-29
PIR, 4-27, 4-32
templates
decision support, 4-1, 4-26, 4-29, 4-32
decision points, 4-30, 4-32
TAI, 4-31
HPT, 4-3, 4-31
HVT, 4-1, 4-24, 4-31
time phase lines, 4-30
event, 4-6, 4-28, 4-32
NAI, 4-28, 4-32
situation, 4-26
model, 5-5
checkist of white, red, and blue questions, 5-8
blue element, 5-7
red element, 5-6
white elements, 5-5
time phase lines, 4-30
TLE. See target location error
TOC. See tactical operations center
topographic workstation, B-13
training, 3-1, 3-4, 10-17
trap map, 10-5
TSS. See target selection standard
index-14
unit workbook, 3--12
unit history, 3-6
user of intelligence, 5-1
vegetation, E-12
video cassette recorders, B-4
video disk players, B-4
visibility, 4-9, 4-13, 4-18, 4-22
weather analysis, 4-1, 4-15, 4-21, 4-26, 7-5
cloud cover, 4-13, 4-22
precipitation, 4-13, 4-17, 4-23
visibility, 4-9, 4-13, 4-18, 4-22
weather factor analysis matrix, 4-24
wind speed and direction, 4-22
weighting indicators, 6-10
white elements, 5-5
word processing software, B-5
working SITMAP, 2-9, 6-4
index-15
fm 34-3
15 MARCH 1990
B Y Order of the Secretary of the Army:
CARL E. VU0N0
General, United States Army
Chief of Staff
Official:
Wl HI AM J . MEEHAN II
Brigadier General, United States Armv
The Adj lit ant Gener al
Dl STRI BUTI ON:
Active Army, USAR, and ARNG: To be distributed in accordance with
DA Form 12-IIE, requirements forFM 34-3, Intelligence Analysis
(Qty rqr block no. 1119).
*U.S.GOVERNMENT PRINTING OFFICE:1996 406-421/62005